New Malware Families Found Targeting VMware ESXi HypervisorsThreat actors have been found deploying never-before-seen post-compromise implants in VMware's virtualization software to seize control of infected systems...
Month: October 2022
Pay What You Want for This Collection of White Hat Hacking Courses
Pay What You Want for This Collection of White Hat Hacking CoursesWhether you relish a mental challenge or fancy a six-figure paycheck, there are many good...
Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign Government
Ex-NSA Employee Arrested for Trying to Sell U.S. Secrets to a Foreign GovernmentA former U.S. National Security Agency (NSA) employee has been arrested on charges of...
Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted Computers
Hackers Exploiting Dell Driver Vulnerability to Deploy Rootkit on Targeted ComputersThe North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage of...
Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers
Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese HackersThe recently discovered Linux-Based ransomware strain known as Cheerscrypt has been outed as a handiwork of a Chinese cyber...
Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain Attack
Comm100 Chat Provider Hijacked to Spread Malware in Supply Chain AttackA threat actor likely with associations to China has been attributed to a new supply chain...
Optus Hack Exposes Data of Nearly 2.1 Million Australian Telecom Customers
Optus Hack Exposes Data of Nearly 2.1 Million Australian Telecom CustomersAustralian telecom giant Optus on Monday confirmed that nearly 2.1 million of its current and former...
BEC Scammer Gets 25-Year Jail Sentence for Stealing Over $9.5 Million
BEC Scammer Gets 25-Year Jail Sentence for Stealing Over $9.5 MillionA 46-year-old man in the U.S. has been sentenced to 25 years in prison after being...
CISA Orders Federal Agencies to Regularly Track Network Assets and Vulnerabilities
CISA Orders Federal Agencies to Regularly Track Network Assets and VulnerabilitiesThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Binding Operational Directive (BOD)...
ProxyNotShell – the New Proxy Hell?
ProxyNotShell – the New Proxy Hell?Nicknamed ProxyNotShell, a new exploit used in the wild takes advantage of the recently published Microsoft Server-Side Request Forgery (SSRF) vulnerability...
Back to Basics: Cybersecurity’s Weakest Link
Back to Basics: Cybersecurity's Weakest LinkA big promise with a big appeal. You hear that a lot in the world of cybersecurity, where you're often promised...
Researchers Report Supply Chain Vulnerability in Packagist PHP Repository
Researchers Report Supply Chain Vulnerability in Packagist PHP RepositoryResearchers have disclosed details about a now-patched high-severity security flaw in Packagist, a PHP software package repository, that...
Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer
Popular YouTube Channel Caught Distributing Malicious Tor Browser InstallerA popular Chinese-language YouTube channel has emerged as a means to distribute a trojanized version of a Windows...
Russian Hacker Arrested in India for Reportedly Helping Students Cheat in JEE-Main Exam
Russian Hacker Arrested in India for Reportedly Helping Students Cheat in JEE-Main ExamIndia's Central Bureau of Investigation (CBI) on Monday disclosed that it has detained a...
3 Reasons Why BEC Scams Work in Real Estate
3 Reasons Why BEC Scams Work in Real EstateIdentity verification could be the key to fighting back and building trust in an industry beset with high-stakes...
Dangerous New Attack Technique Compromising VMware ESXi Hypervisors
Dangerous New Attack Technique Compromising VMware ESXi HypervisorsChina-based threat actor used poisoned vSphere Installation Bundles to deliver multiple backdoors on systems, security vendor says.Read MoreDark ReadingChina-based...
The Country Where You Live Impacts Password Choices
The Country Where You Live Impacts Password ChoicesLiteracy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given...
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in Return
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in ReturnCall it cross-border enlightened self-interest: As one of the US's premier trade...
Ransomware Attacks Continue Increasing: 20% of All Reported Attacks Occurred in the Last 12 Months – New Survey
Ransomware Attacks Continue Increasing: 20% of All Reported Attacks Occurred in the Last 12 Months - New SurveySurvey of over 2,000 IT pros revealed that a...
Pathlock Expands SAP Capabilities with Acquisition of Grey Monarch
Pathlock Expands SAP Capabilities with Acquisition of Grey MonarchCombination of two companies to help SAP customers streamline audit, compliance and control processes.Read MoreDark ReadingCombination of two...
KnowBe4 Simplifies Compliance Requirements for Healthcare Privacy
KnowBe4 Simplifies Compliance Requirements for Healthcare PrivacyKnowBe4's Compliance Audit Readiness Assessment (CARA) now addresses select requirements from HIPAA Security Rule.Read MoreDark ReadingKnowBe4's Compliance Audit Readiness Assessment...
Latest Delinea Update Streamlines DevOps Security
Latest Delinea Update Streamlines DevOps Security.Read MoreDark Reading.
Intel Hardens Confidential Computing With Project Amber Updates
Intel Hardens Confidential Computing With Project Amber UpdatesThe chip giant has developed new features and services to make it tougher for malicious hackers and insiders to...
Organizations Finding the Need for New Approaches on the Cybersecurity Front, CompTIA research reveals
Organizations Finding the Need for New Approaches on the Cybersecurity Front, CompTIA research revealsSettling for 'satisfactory' level of readiness may underestimate growing levels of risk.Read MoreDark...
YouMail, Inc. and WMC Global Partner to Deliver Voice and SMS Phishing Disruption Services
YouMail, Inc. and WMC Global Partner to Deliver Voice and SMS Phishing Disruption ServicesJoint phishing intelligence solution provides 360-degree mobile communication defense.Read MoreDark ReadingJoint phishing intelligence...
Veristor Partners with SANS Security Awareness to Deliver Employee Security Awareness Training
Veristor Partners with SANS Security Awareness to Deliver Employee Security Awareness TrainingCompanies collaborate to strengthen organizations' first line of security defense – end users.Read MoreDark ReadingCompanies...
Aunalytics Launches Security Patching Platform as a Service
Aunalytics Launches Security Patching Platform as a ServiceExpedited software patching and updating recognized as one of the most important processes to protect against system compromise from...
Israel Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security Training
Israel Cybersecurity Enterprise (ICE) Teams with CybeReady to Deliver World-Class Security TrainingSecurity service provider selects cybersecurity training platform to safeguard enterprises in LATAM.Read MoreDark ReadingSecurity service...
Safous Adds Browser Isolation to Its Zero-Trust Network Access Service
Safous Adds Browser Isolation to Its Zero-Trust Network Access ServiceThis new function offers secure access to corporate applications and external SaaS through a virtual browser.Read MoreDark...
Cyera Survey Finds One in Three Respondents Want to Minimize Cloud Data Risk
Cyera Survey Finds One in Three Respondents Want to Minimize Cloud Data RiskMultiple providers say 'cloud data sprawl' makes managing cloud data risk a priority initiative...