Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one of the two security flaws that could be potential...
Read More
Remcos RAT Spreading Through Adult Games in New Attack Wave
The remote access trojan (RAT) known as Remcos RAT has been found being propagated via webhards by disguising it as adult-themed games in So...
Read More
10 Best Firewall as a Service (FWaaS) Providers – 2024
Firewall as a Service (FWaaS) is an emerging security model in cloud computing and network security. It represents a shift from traditional,...
Read More
Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims
The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of one year between 2022 ...
Read More
Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer
Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer ca...
Read More
Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows
Cybersecurity researchers have disclosed a security flaw in the Opera web browser for Microsoft Windows and Apple macOS that could be exploi...
Read More
3 Ransomware Group Newcomers to Watch in 2024
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 4,368 cases. Figur...
Read More
10 Best Zero Trust Security Vendors – 2024
Zero Trust Security is a strategic approach to cybersecurity that centers on the principle of “never trust, always verify.” This model quest...
Read More
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability
Thousands of WordPress sites using a vulnerable version of the Popup Builder plugin have been compromised with a malware called Balada Injec...
Read More
DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023
The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS) attacks, accountin...
Read More
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has named Microsoft a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. The post Microsoft is named a L...
Read More
Attacks against Denmark ‘s energy sector were not carried out by Russia-linked APT
Forescout experts questioned the attribution of cyber attacks that targeted the energy sector in Denmark in 2023 to the Russia-linked Sandwo...
Read More
New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks
The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of the Russia-linked Sandworm hacking gr...
Read More
Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches
Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series firewalls and EX Series ...
Read More
29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services
A 29-year-old Ukrainian national has been arrested in connection with running a “sophisticated cryptojacking scheme,” netting them over $2 m...
Read More
Microsoft is named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Gartner has named Microsoft a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. The post Microsoft is named a L...
Read More
Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches
Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series firewalls and EX Series ...
Read More
What is the Difference Between ISO 27001 & 27002 Compliance? – A Detailed Guide
ISO 27001 and ISO 27002 are international standards that provide a framework for managing information security within an organization. In an...
Read More
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong...
Read More
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP
GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take over accounts wi...
Read More
Most Businesses Lack Confidence In Ability To Overcome Cyberattacks
Majority of businesses still not confident in ability to overcome cyber attacks, research from Palo Alto Networks finds This article has bee...
Read More
Stay protected online with the ESET NOD32 2024 antivirus software for $25
Get multilayered proactive protection, faster operations, and more protection from this proven provider. This article has been indexed from ...
Read More
Hackers Impersonating as Security Researcher to Aid Ransomware Victims
Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, t...
Read More
Microsoft Patch Tuesday 2024 Released with Fixes for 49 vulnerabilities – Update Now!
Microsoft released its first patch on Tuesday, 2024, in which nearly 49 vulnerabilities have been fixed in Microsoft products and 5 vulnerab...
Read More
Critical Cisco Unity Connection Flaw Let Attackers Run Command as Root User
A critical vulnerability of severe severity has been found in Cisco Unity Connection’s web-based management interface. This flaw might allow...
Read More
Network Security Checklist – Complete Guide To Protect Enterprise Networks (2024)
Network security is paramount in today’s digital landscape, where organizations face increasingly sophisticated threats. This guide presents...
Read More
11 Best Single Sign-On (SSO) Providers – 2024
Single Sign-On (SSO) enables users to conveniently access multiple applications using a single set of login credentials. Allow me to provide...
Read More
FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data
The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from sharin...
Read More
SAP Security Patch Addresses Privilege Escalation Flaw
SAP is a leading enterprise software suite that integrates various business functions like:- This renowned enterprise software suite helps ...
Read More
HPE Announces Acquisition of Juniper Networks for $14 Billion
The union of Juniper Networks and HPE marks a bold leap forward in the age of AI-powered networking. Their combined focus transcends mere p...
Read More
Hackers Exploiting Poorly Unsecured MS SQL Servers Across the Globe
An ongoing threat campaign dubbed RE#TURGENCE has been observed, which involves targeting MS SQL servers in an attempt to deliver a MIMIC ra...
Read More
Sea Turtle APT Group Exploiting Known Vulnerabilities to Attack IT-service Providers
To obtain access to a variety of clients’ systems and data in a single attack, hackers frequently target IT service providers. Their strate...
Read More
Critical Apache OFBiz Zero-day Flaw Exploited in the Wild
Researchers uncovered a critical authentication bypass zero-day flaw tracked as CVE-2023-51467, with a CVSS score of 9.8 affecting Apache OF...
Read More
Wi-Fi Alliance Announces Wi-Fi 7 to Boost performance
Wi-Fi Alliance unleashes the next generation of connectivity with Wi-Fi CERTIFIED 7™. This revolutionary technology promises to turbocharge ...
Read More
Silver RAT Evades Anti-viruses to Hack Windows Machines
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. These malicious tools al...
Read More
NIST Details Types of Cyberattacks that Leads to Malfunction of AI Systems
Artificial intelligence (AI) systems can be purposefully tricked or even “poisoned” by attackers, leading to severe malfunctions and strikin...
Read More
Mimecast Announces Acquisition of Elevate Security
In a pivotal move that elevates cybersecurity to a new level, Mimecast, a leading email and collaboration security company, has acquired Ele...
Read More
North Korean Hackers Stole Over $600 Million in Cryptocurrency
The Democratic People’s Republic of Korea (DPRK) has reportedly stolen nearly $600 million in cryptocurrency in 2023. Additionally, there ha...
Read More
Cyqur Launches A Game-Changing Data Encryption and Fragmentation Web Extension
The web extension, patented in the U.S. and U.K., is now available for pre-order in a limited, pre-sale event. Lack of online data security ...
Read More
Russian Hackers Were Inside Ukrainian Telecoms Giant for Almost a Year
Russian hackers have been inside Ukrainian telecoms company Kyivstar’s system since at least May of last year, causing the most severe cyber...
Read More
SentinelOne acquires Peak XV-backed PingSafe for over $100 million
SentinelOne’s deal to acquire PingSafe valued the Peak XV-backed young startup at over $100 million, two sources familiar with the matter to...
Read More
AuthLogParser: Open-source tool for analyzing Linux authentication logs
AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authenticat...
Read More
North Korea’s Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023
Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea) have plundered at least $600 million in ...
Read More
DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud
The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which i...
Read More
North Korea's Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023
Threat actors affiliated with the Democratic People's Republic of Korea (also known as North Korea) have plundered at least $600 million...
Read More
IT Security News Daily Summary 2024-01-06
USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’ Cyb...
Read More
USENIX Security ’23 – “If I Could Do This, I Feel Anyone Could” *The Design And Evaluation Of A Secondary Authentication Factor Manager’
Authors/Presenters: Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons“ Many thanks to USENIX for publishing their outst...
Read More
Cybersecurity trends and challenges to watch out for in 2024 – Week in security with Tony Anscombe
What are some of the key cybersecurity trends that people and organizations should have on their radars this year? This article has been ind...
Read More
Human Behavior In Digital Forensics, pt II
One the heels of my first post on this topic, I wanted to follow up with some additional case studies that might demonstrate how digital for...
Read More
How Smart Car is Probably Tracking You? Automative Data Security Risks
If you drive a smart car, its high-tech, internet-connected systems are likely monitoring your every move. Vehicles with these features typi...
Read More
Subscribe to:
Posts (Atom)