Mantenga a raya a su Grinch: así es como mantenerse seguro en línea esta temporada navideñaA medida que se acerca la temporada navideña, las compras en...
Month: December 2022
CommonSpirit Ransomware Breach Affects About 624,000 So Far
CommonSpirit Ransomware Breach Affects About 624,000 So FarLeaked Data Includes Names, Addresses and BirthdatesChicago-based hospital chain CommonSpirit reported to federal regulators that its October ransomware incident...
Cisco advierte sobre una falla sin parchar de alta gravedad que afecta el firmware de teléfonos IP
Cisco advierte sobre una falla sin parchar de alta gravedad que afecta el firmware de teléfonos IPCisco ha lanzado una nueva advertencia de seguridad sobre una...
Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware Supplier
Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware SupplierA state-sponsored hacking group with links to Russia has been linked to attack infrastructure that spoofs the...
Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities
Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European EntitiesThe China-linked nation-state hacking group referred to as Mustang Panda is using lures related to the ongoing...
How XDR Helps Protect Critical Infrastructure
How XDR Helps Protect Critical InfrastructureCritical infrastructure is important for societal existence, growth, and development. Societies are reliant on the services provided by critical infrastructure sectors...
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and...
Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack
Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain AttackAn Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set of...
Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers
Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft HackersAn Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target...
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and Bitdefender
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and BitdefenderLooking to up your cybersecurity game in the new year? Do not just buy electronics this vacation...
Apple Boosts Security With New iMessage, Apple ID, and iCloud Protections
Apple Boosts Security With New iMessage, Apple ID, and iCloud ProtectionsApple on Wednesday announced a raft of security measures, including an Advanced Data Protection setting that enables end-to-end...
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped ComputersAn unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information from air-gapped...
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android Apps
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android AppsResearchers have shed light on a new hybrid malware campaign targeting both Android and Windows operating...
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics
MuddyWater Hackers Target Asian and Middle East Countries with Updated TacticsThe Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well as...
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop ResolverThe subgroup of an Iranian nation-state group known as Nemesis Kitten has been attributed as behind...
Why is Robust API Security Crucial in eCommerce?
Why is Robust API Security Crucial in eCommerce?API attacks are on the rise. One of their major targets is eCommerce firms like yours. APIs are a...
US Congress rolls back proposal to restrict use of Chinese chips
US Congress rolls back proposal to restrict use of Chinese chipsAfter business groups argued that proposed legislation to curb use of Chinese-made semiconductors would hurt national...
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin WormCybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S....
Using XDR to Consolidate and Optimize Cybersecurity Technology
Using XDR to Consolidate and Optimize Cybersecurity TechnologyBusinesses know they need cybersecurity, but it seems like a new acronym and system is popping up every day....
Apple finally adds encryption to iCloud backups
Apple finally adds encryption to iCloud backupsApple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups,...
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones Firmware
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones FirmwareCisco has released a new security advisory warning of a high-severity flaw affecting IP Phone 7800 and...
Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls
Researchers Detail New Attack Method to Bypass Popular Web Application FirewallsA new attack method can be used to circumvent web application firewalls (WAFs) of various vendors...
Microsoft’s rough 2022 security year in review
Microsoft's rough 2022 security year in reviewWe soon close out the security year of 2022. Only time will tell what 2023 will bring, but for IT...
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware VariantTravel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a...
Royal Ransomware Threat Takes Aim at U.S. Healthcare System
Royal Ransomware Threat Takes Aim at U.S. Healthcare SystemThe U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting healthcare...
FinTech & Banking: A Comprehensive Guide to Client Onboarding
FinTech & Banking: A Comprehensive Guide to Client OnboardingThe customer experience at the world’s biggest banks and fintech firms is undergoing a significant change. Because of...
JSON-based SQL injection attacks trigger need to update web application firewalls
JSON-based SQL injection attacks trigger need to update web application firewallsSecurity researchers have developed a generic technique for SQL injection that bypasses multiple web application firewalls...
Keep Your Grinch at Bay: Here’s How to Stay Safe Online this Holiday Season
Keep Your Grinch at Bay: Here's How to Stay Safe Online this Holiday SeasonAs the holiday season approaches, online shopping and gift-giving are at the top...
Complete guide to OT network segmentation
Complete guide to OT network segmentationAs industrial businesses connect their OT and IT networks, network segmentation is becoming an increasingly important approach. Using this method, it...
Android app signing keys leaked and used to sign malware
Android app signing keys leaked and used to sign malware One of the most important pillars of Android security is the cryptographic signature key used by...




























