Cisco fixes High-Severity bug in Secure Web ApplianceCisco addressed a high-severity escalation of privilege vulnerability (CVE-2022-20871) in AsyncOS for Cisco Secure Web Appliance. Cisco Secure Web Appliance (formerly Secure Web Appliance (WSA)) offers protection...
Month: August 2022
Bumblebee attacks, from initial access to the compromise of Active Directory Services
Bumblebee attacks, from initial access to the compromise of Active Directory ServicesThreat actors are using the Bumblebee loader to compromise Active Directory services as part of...
Zero Trust: Security Model for A Fluid Perimeter
Zero Trust: Security Model for A Fluid PerimeterBy Debanjali Ghosh, Technical Evangelist, ManageEngine The concept of a network being fully enclosed within a building, and […]...
A flaw in Amazon Ring could expose user’s camera recordings
A flaw in Amazon Ring could expose user’s camera recordingsAmazon addressed a high-severity flaw in its Ring app for Android that could have exposed sensitive information...
Russia-linked Cozy Bear uses evasive techniques to target Microsoft 365 users
Russia-linked Cozy Bear uses evasive techniques to target Microsoft 365 usersRussia-linked APT group Cozy Bear continues to target Microsoft 365 accounts in NATO countries for cyberespionage...
Weekly Update 309
Weekly Update 309Right off the back of a visit to our wedding venue (4 weeks and counting!) and a few hours before heading to the snow...
TA558 cybercrime group targets hospitality and travel orgs
TA558 cybercrime group targets hospitality and travel orgsTA558 cybercrime group is behind a malware campaign targeting hospitality, hotel, and travel organizations in Latin America Researchers from Proofpoint...
Threat Group Ramps-Up Attacks on Travel Sector in 2022
Threat Group Ramps-Up Attacks on Travel Sector in 2022Corporate and customer data at risk, warns ProofpointLeer másCorporate and customer data at risk, warns Proofpoint
Exposed VNC instances threatens critical infrastructure as attacks spike
Exposed VNC instances threatens critical infrastructure as attacks spikeNew research from threat intelligence and cybersecurity company Cyble has identified a peak in attacks targeting virtual network...
Safe Security debuts two free risk assessment tools for businesses
Safe Security debuts two free risk assessment tools for businessesCybersecurity risk assessment company Safe Security on Tuesday rolled out two new online risk assessment tools for...
Quarter of All Gambling Sites Hit by DDoS Attacks in June
Quarter of All Gambling Sites Hit by DDoS Attacks in JuneThe attacks reportedly increased in conjunction with the start of the Wimbledon tennis tournamentLeer másThe attacks...
“Evil PLC Attack” weaponizes PLCs to infect engineering workstations
"Evil PLC Attack" weaponizes PLCs to infect engineering workstationsMost attack scenarios against industrial installations, whether in manufacturing or in critical infrastructure, focus on compromising programmable logic...
ATMZOW JS Sniffer Campaign Linked to Hancitor Malware
ATMZOW JS Sniffer Campaign Linked to Hancitor MalwareATMZOW infected at least 483 websites across four continents since the beginning of 2019Leer másATMZOW infected at least 483...
Hackers Deploy Bumblebee Loader to Breach Target Networks
Hackers Deploy Bumblebee Loader to Breach Target NetworksMost Bumblebee infections started by end-users executing LNK filesLeer másMost Bumblebee infections started by end-users executing LNK files
Ransomware safeguards for small- to medium-sized businesses
Ransomware safeguards for small- to medium-sized businessesThe Institute for Security and Technology (IST) recently released a “Blueprint for Ransomware Defense.” The guide includes recommendations of defensive...
Cyber Tops Staff Retention as Biggest Business Risk
Cyber Tops Staff Retention as Biggest Business RiskPwC report finds execs are paying more attention to risk managementLeer másPwC report finds execs are paying more attention...
What is zk-SNARK?
What is zk-SNARK?Zk-SNARK, which stands for zero-knowledge succinct non-interactive argument or knowledge, is the most popular zero-knowledge protocol. This a space of increasing importance, as zero...
Google updates Chronicle with enhanced threat detection
Google updates Chronicle with enhanced threat detectionGoogle Cloud Wednesday announced the general availability of what it calls “curated detection” for its Chronicle security analysis platform. The...
UK Carrier Claims to Block One Million Vishing Calls Per Day
UK Carrier Claims to Block One Million Vishing Calls Per DayEE says AI tech is stopping international scamsLeer másEE says AI tech is stopping international scams
Estonia Repels Biggest Cyber-Attack Since 2007
Estonia Repels Biggest Cyber-Attack Since 2007Tiny Baltic nation riles Russia by removing monumentsLeer másTiny Baltic nation riles Russia by removing monuments
Businesses Found to Neglect Cybersecurity Until it is Too Late
Businesses Found to Neglect Cybersecurity Until it is Too LateThe UK government report found that many leaders only review cybersecurity practices following an incidentLeer másThe UK...
Xiaomi Phone Bug Allowed Payment Forgery
Xiaomi Phone Bug Allowed Payment ForgeryMobile transactions could’ve been disabled, created and signed by attackers.Leer másThreatpostMobile transactions could’ve been disabled, created and signed by attackers.
U.K. Water Supplier Hit with Clop Ransomware Attack
U.K. Water Supplier Hit with Clop Ransomware AttackThe incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its...
Apple Warns of Critical Security Risk in Safari For iPhones, iPads and Macs
Apple Warns of Critical Security Risk in Safari For iPhones, iPads and MacsThe vulnerability gave hackers the ability to infiltrate WebKit, the engine that powers SafariLeer...
New Deep Instinct partner program targets MSSPs fighting ransomware
New Deep Instinct partner program targets MSSPs fighting ransomwareCybersecurity firm Deep Instinct has rolled out a new partner program to provide its endpoint and application protection...
Microsoft: Cryptojackers Continue to Evolve to Be Stealthier and Spread Faster
Microsoft: Cryptojackers Continue to Evolve to Be Stealthier and Spread FasterCryptojackers take advantage of legitimate system binaries on more than 200,000 devices dailyLeer másCryptojackers take advantage...
A step‑by‑step guide to enjoy LinkedIn safely
A step‑by‑step guide to enjoy LinkedIn safelyLinkedIn privacy settings are just as overwhelming as any other social media settings. There’s a lot of menus, a lot...
NIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessment
NIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentThe U.S. National Institute of Standards and Technology (NIST) hosted its first workshop yesterday on the Cybersecurity...
APT Lazarus Targets Engineers with macOS Malware
APT Lazarus Targets Engineers with macOS MalwareThe North Korean APT is using a fake job posting for Coinbase in a cyberespionage campaign targeting users of both...
China-backed APT41 Group Hacked at Least 13 Victims in 2021
China-backed APT41 Group Hacked at Least 13 Victims in 2021The majority of the attacks spotted relied primarily on SQL injections on targeted domainsLeer másThe majority of...





























