10 Best Firewall as a Service (FWaaS) Providers – 2024

Firewall as a Service (FWaaS) is an emerging security model in cloud computing and network security. It represents a shift from traditional,...
Read More

Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims

The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of one year between 2022 ...
Read More

Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer

Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer ca...
Read More

Opera MyFlaw Bug Could Let Hackers Run ANY File on Your Mac or Windows

Cybersecurity researchers have disclosed a security flaw in the Opera web browser for Microsoft Windows and Apple macOS that could be exploi...
Read More

3 Ransomware Group Newcomers to Watch in 2024

The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 4,368 cases.  Figur...
Read More

10 Best Zero Trust Security Vendors – 2024

Zero Trust Security is a strategic approach to cybersecurity that centers on the principle of “never trust, always verify.” This model quest...
Read More

Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability

Thousands of WordPress sites using a vulnerable version of the Popup Builder plugin have been compromised with a malware called Balada Injec...
Read More

DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023

The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS) attacks, accountin...
Read More

New Findings Challenge Attribution in Denmark's Energy Sector Cyberattacks

The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of the Russia-linked Sandworm hacking gr...
Read More

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches

Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series firewalls and EX Series ...
Read More

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

A 29-year-old Ukrainian national has been arrested in connection with running a “sophisticated cryptojacking scheme,” netting them over $2 m...
Read More

What is the Difference Between ISO 27001 & 27002 Compliance? – A Detailed Guide

ISO 27001 and ISO 27002 are international standards that provide a framework for managing information security within an organization. In an...
Read More

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO

Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong...
Read More

Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP

GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take over accounts wi...
Read More

Hackers Impersonating as Security Researcher to Aid Ransomware Victims

Hackers impersonate security researchers to exploit trust and credibility. By posing as legitimate figures in the cybersecurity community, t...
Read More

Microsoft Patch Tuesday 2024 Released with Fixes for 49 vulnerabilities – Update Now!

Microsoft released its first patch on Tuesday, 2024, in which nearly 49 vulnerabilities have been fixed in Microsoft products and 5 vulnerab...
Read More

Critical Cisco Unity Connection Flaw Let Attackers Run Command as Root User

A critical vulnerability of severe severity has been found in Cisco Unity Connection’s web-based management interface. This flaw might allow...
Read More

Network Security Checklist – Complete Guide To Protect Enterprise Networks (2024)

Network security is paramount in today’s digital landscape, where organizations face increasingly sophisticated threats. This guide presents...
Read More

11 Best Single Sign-On (SSO) Providers – 2024

Single Sign-On (SSO) enables users to conveniently access multiple applications using a single set of login credentials. Allow me to provide...
Read More

FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data

The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from sharin...
Read More

SAP Security Patch Addresses Privilege Escalation Flaw

SAP is a leading enterprise software suite that integrates various business functions like:-  This renowned enterprise software suite helps ...
Read More

HPE Announces Acquisition of Juniper Networks for $14 Billion

The union of Juniper Networks and HPE marks a bold leap forward in the age of AI-powered networking.  Their combined focus transcends mere p...
Read More

Hackers Exploiting Poorly Unsecured MS SQL Servers Across the Globe

An ongoing threat campaign dubbed RE#TURGENCE has been observed, which involves targeting MS SQL servers in an attempt to deliver a MIMIC ra...
Read More

Sea Turtle APT Group Exploiting Known Vulnerabilities to Attack IT-service Providers

To obtain access to a variety of clients’ systems and data in a single attack, hackers frequently target IT service providers.  Their strate...
Read More

Critical Apache OFBiz Zero-day Flaw Exploited in the Wild

Researchers uncovered a critical authentication bypass zero-day flaw tracked as CVE-2023-51467, with a CVSS score of 9.8 affecting Apache OF...
Read More

Wi-Fi Alliance Announces Wi-Fi 7 to Boost performance

Wi-Fi Alliance unleashes the next generation of connectivity with Wi-Fi CERTIFIED 7™. This revolutionary technology promises to turbocharge ...
Read More

Silver RAT Evades Anti-viruses to Hack Windows Machines

Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. These malicious tools al...
Read More

NIST Details Types of Cyberattacks that Leads to Malfunction of AI Systems

Artificial intelligence (AI) systems can be purposefully tricked or even “poisoned” by attackers, leading to severe malfunctions and strikin...
Read More

Mimecast Announces Acquisition of Elevate Security

In a pivotal move that elevates cybersecurity to a new level, Mimecast, a leading email and collaboration security company, has acquired Ele...
Read More

North Korean Hackers Stole Over $600 Million in Cryptocurrency

The Democratic People’s Republic of Korea (DPRK) has reportedly stolen nearly $600 million in cryptocurrency in 2023. Additionally, there ha...
Read More

Cyqur Launches A Game-Changing Data Encryption and Fragmentation Web Extension

The web extension, patented in the U.S. and U.K., is now available for pre-order in a limited, pre-sale event. Lack of online data security ...
Read More

Russian Hackers Were Inside Ukrainian Telecoms Giant for Almost a Year

Russian hackers have been inside Ukrainian telecoms company Kyivstar’s system since at least May of last year, causing the most severe cyber...
Read More

DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud

The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which i...
Read More

North Korea's Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023

Threat actors affiliated with the Democratic People's Republic of Korea (also known as North Korea) have plundered at least $600 million...
Read More

How Smart Car is Probably Tracking You? Automative Data Security Risks

If you drive a smart car, its high-tech, internet-connected systems are likely monitoring your every move. Vehicles with these features typi...
Read More

Information Security Magazine

Latest Cyber Hacking News