Ireland's Data Protection Commission (DPC) has levied fines of €265 million ($277 million) against Meta Platforms for failing to safegua...
Read More
The 5 Cornerstones for an Effective Cyber Security Awareness Training
It's not news that phishing attacks are getting more complex and happening more often. This year alone, APWG reported a record-breaking ...
Read More
Over a Dozen New BMC Firmware Flaws Expose OT and IoT Devices to Remote Attacks
Over a dozen security flaws have been discovered in baseboard management controller (BMC) firmware from Lanner that could expose operational...
Read More
U.S. Banned Chinese Telecom & Surveillance Cameras That Pose National Security Threat
The US has banned the import and sale of Chinese telecom equipment and security camera systems from Huawei, ZTE, Hytera Communications, Hikv...
Read More
Massive Twitter Breach – Over 5.4 Million users’ Data Leaked Online
It has been discovered recently that over 5.4 million personal records of Twitter users have been stolen by threat actors and publicly expos...
Read More
Compromised Data of Over 9 Million Health Insurance Users Is Being Exposed On the Dark Web
After hitting Australian telecommunications company Optus, in which the information of over 9 million users has been exposed, cybercriminals...
Read More
Elon Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages
Twitter chief executive Elon Musk confirmed plans for end-to-end encryption (E2EE) for direct messages on the platform. The feature is part ...
Read More
Reasons for Being Updated ISO 27001 Crucial For Business Security
The supplier of the UK’s National Health Service, Advanced, faced a cyberattack on 4 august 2022 in the morning. It worked as a vicious ex...
Read More
All You Need to Know About Emotet in 2022
For 6 months, the infamous Emotet botnet has shown almost no activity, and now it's distributing malicious spam. Let's dive into det...
Read More
Update Chrome Browser Now to Patch New Actively Exploited Zero-Day Flaw
Google on Thursday released software updates to address yet another zero-day flaw in its Chrome web browser. Tracked as CVE-2022-4135, the h...
Read More
Dell, HP, and Lenovo Devices Found Using Outdated OpenSSL Versions
An analysis of firmware images across devices from Dell, HP, and Lenovo has revealed the presence of outdated versions of the OpenSSL crypto...
Read More
Boost Your Security with Europe's Leading Bug Bounty Platform
As 2022 comes to an end, now's the time to level up your bug bounty program with Intigriti. Are you experiencing slow bug bounty lead ti...
Read More
Bahamut Cyber Espionage Hackers Targeting Android Users with Fake VPN Apps
The cyber espionage group known as Bahamut has been attributed as behind a highly targeted campaign that infects users of Android devices wi...
Read More
Meta Takes Down Fake Facebook and Instagram Accounts Linked to Pro-U.S. Influence Operation
Meta Platforms on Tuesday said it took down a network of accounts and pages across Facebook and Instagram that were operated by people assoc...
Read More
Will Passwordless Solutions Become the Leading Approach to Secure Identities?
Password issues are still a constant struggle for organizations. The amount of time IT teams spend managing user passwords and credentials i...
Read More
King Of Malware “Emotet” Launching Aggressive Attack Via XLS Doc & New Payloads
Emotet, An infamous banking trojan-based malware family with a sophisticated attack background, returns with a new attack strain via XLS doc...
Read More
U.S. Authorities Seize Domains Used in 'Pig butchering' Cryptocurrency Scams
The U.S. Justice Department (DoJ) on Monday announced the takedown of seven domain names in connection to a "pig butchering" crypt...
Read More
Been Doing It The Same Way For Years? Think Again.
As IT professionals, we all reach a certain point in our IT career where we realize that some of our everyday tasks are done the same way ye...
Read More
Google Wins Lawsuit Against Russians Linked to Blockchain-based Glupteba Botnet
Google has won a lawsuit filed against two Russian nationals in connection with the operation of a botnet called Glupteba, the company said ...
Read More
Google Identifies 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild
Google Cloud last week disclosed that it identified 34 different hacked release versions of the Cobalt Strike tool in the wild, the earliest...
Read More
Indian Government Publishes Draft of Digital Personal Data Protection Bill 2022
The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it the fourth such effort si...
Read More
Hive Ransomware Attackers Extorted $100 Million from Over 1,300 Companies Worldwide
The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300 companies across the world,...
Read More
Meta Fired Several Employees For Hijacking Facebook and Instagram User Accounts
As a result of hijacking the Facebook and Instagram accounts of users over the course of the last year, Meta has fired more than two dozen e...
Read More
100 Apps, Endless Security Checks
On average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organizati...
Read More
Warning: New RapperBot Campaign Aims to Launch DDoS Attacks at Game Servers
Cybersecurity researchers have unearthed new samples of malware called RapperBot that are being used to build a botnet capable of launching ...
Read More
Retesting: A Re-Pentesting Towards More Secure Products For Red & Blue Teamers
Let’s examine how rigorous retesting of products during a pentest engagement can make products more secure and what goes into performing eff...
Read More
Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files
Researchers uncovered an infamous and widely distributed malware Emotet, now targeting Windows users by employing a malicious Excel File aft...
Read More
What is an External Penetration Test?
A penetration test (also known as a pentest) is a security assessment that simulates the activities of real-world attackers to identify secu...
Read More
Hackers Hide Information-Stealing Malware in PNG Files Using Steganography
Experts at Avast, who built on the discoveries of ESET, the first to notice and report on the threat group known as “Worok”, conceals malwar...
Read More
Russian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks
The U.S. Department of Justice (DoJ) has announced charges against a dual Russian and Canadian national for his alleged participation in Loc...
Read More
$70,000 Bug Let Hackers Bypass Google Pixel Lock Screen Pattern & Password
David Schütz, a security researcher, has identified a critical bug in the Google Pixel phones that allow hackers to bypass the passcode and ...
Read More
Re-Focusing Cyber Insurance with Security Validation
The rise in the costs of data breaches, ransomware, and other cyber attacks leads to rising cyber insurance premiums and more limited cyber ...
Read More
New UEFI Firmware Flaws Reported in Several Lenovo Notebook Models
PC maker Lenovo has addressed yet another set of three shortcomings in the Unified Extensible Firmware Interface (UEFI) firmware affecting s...
Read More
Several Cyber Attacks Observed Leveraging IPFS Decentralized Network
A number of phishing campaigns are leveraging the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infra...
Read More
U.S. Uncovered Hacker Who Stole 50,000 Bitcoins From The Silk Road Dark Web
Silk Road was robbed by James Zhong, 32, of Gainesville and Athens, Georgia a decade ago of more than $3.36 billion in bitcoin (51,351.89785...
Read More
Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days
Microsoft's latest round of monthly security updates has been released with fixes for 68 vulnerabilities spanning its software portfolio...
Read More
New Laplas Clipper Malware Targeting Cryptocurrency Users via SmokeLoader
Cryptocurrency users are being targeted with a new clipper malware strain dubbed Laplas by means of another malware known as SmokeLoader. Sm...
Read More
5 Reasons to Consolidate Your Tech Stack
The news surrounding the slowing economy has many wondering how much of an impact it will have on their businesses – and lives. And there...
Read More
29 Weaponized Python PyPI Packages Aimed to Infect Developers With Malware
The Python Package Index (PyPI) has been found to contain 29 potentially malicious packages. In most of these cases, you will find that the ...
Read More
Path To Pentest Guide : 10 Best Penetration Testing Phases, Lifecycle, Methods – 2023
Penetration Testing Phases involves a various Methods, phases, lifecycle and scope to prepare a best checklist to perform the quality penetr...
Read More
Medibank Refuses to Pay Ransom After 9.7 Million Customers Exposed in Ransomware Hack
Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of its current and former customers we...
Read More
This Hidden Facebook Tool Lets Users Remove Their Email or Phone Number Shared by Others
Facebook appears to have silently rolled out a tool that allows users to remove their contact information, such as phone numbers and email a...
Read More
Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities
Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks. The researchers...
Read More
Experts Find Urlscan Security Scanner Inadvertently Leaks Sensitive URLs and Data
Security researchers are warning of "a trove of sensitive information" leaking through urlscan.io, a website scanner for suspiciou...
Read More
Robin Banks Phishing Service for Cybercriminals Returns with Russian Server
A phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian provider of b...
Read More
Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools
There is evidence found pointing to the connection between FIN7 (aka Carbanak), a financially motivated hacking group, and the Black Basta r...
Read More
Chinese APT Hackers Deploy LODEINFO Malware in Windows to Open Backdoor
Cybersecurity researchers at Kaspersky’s threat research lab have recently tracked down a revised version of LODEINFO malware that has been ...
Read More
CISA Warns of Critical Vulnerabilities in 3 Industrial Control System Software
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multi...
Read More
New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users' Data
Popular short-form video-sharing service TikTok is revising its privacy policy for European users to make it explicitly clear that user data...
Read More
Experts Warn of SandStrike Android Spyware Infecting Devices via Malicious VPN App
A previously undocumented Android spyware campaign has been found striking Persian-speaking individuals by masquerading as a seemingly harml...
Read More
Subscribe to:
Posts (Atom)