When Efforts to Contain a Data Breach BackfireEarlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The...
Year: 2022
A Parent’s Guide To The Metaverse – Part One
A Parent’s Guide To The Metaverse – Part One We’ve all heard about the Metaverse. And there’s no doubt it has certainly captured the attention of...
Apple security updates fix 2 zero-days used to hack iPhones, Macs
Apple security updates fix 2 zero-days used to hack iPhones, MacsApple has released emergency security updates today to fix two zero-day vulnerabilities previously exploited by attackers...
Africa – the most cyber attacked continent, a 2022 review of trends
Africa – the most cyber attacked continent, a 2022 review of trendsIssam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the...
Kage – Graphical User Interface For Metasploit Meterpreter And Session Handler
Kage – Graphical User Interface For Metasploit Meterpreter And Session HandlerKage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with...
Google Chrome Zero-Day Found Exploited in the Wild
Google Chrome Zero-Day Found Exploited in the WildThe high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.Leer másDark ReadingThe high-severity security vulnerability (CVE-2022-2856) is due...
TechScape: Why can’t crypto exterminate its bugs?
TechScape: Why can’t crypto exterminate its bugs?‘Provenance hashes’ and bug bounties are supposed to protect platforms. Why do so many flaws in crypto and open-source projects...
Google Cloud Adds Curated Detection to Chronicle
Google Cloud Adds Curated Detection to ChronicleThe curated detection feature for Chronicle SecOps Suite provides security teams with actionable insights on cloud threats and Windows-based attacks...
Discover Cloud Smart Networking and Security at VMware Explore 2022
Discover Cloud Smart Networking and Security at VMware Explore 2022The battleground has shifted dramatically. As networks expand and become more complex with the growth of multi-cloud...
VMware’s Karen Worstell Recognized as 2022 ISSA International Distinguished Fellow
VMware’s Karen Worstell Recognized as 2022 ISSA International Distinguished FellowAt Black Hat USA, VMware senior cybersecurity strategist Karen Worstell was recognized as a 2022 ISSA International...
The Complete Networking Professionals’ Guide to VMware Explore
The Complete Networking Professionals’ Guide to VMware ExploreThe rapid shift from on-premises to the cloud is answering as many questions as it is creating. You need...
The Definitive Security Professionals’ Guide to VMware Explore
The Definitive Security Professionals’ Guide to VMware ExploreAs the architectures used by your organization continue to rapidly evolve with the growth of multi-cloud environments, so do...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Patch Madness: Vendor Bug Advisories Are Broken, So Broken
Patch Madness: Vendor Bug Advisories Are Broken, So BrokenDustin Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the...
Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass
Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypassSome signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) used by Windows could allow attackers to...
Cybercriminals Weaponizing Ransomware Data for BEC Attacks
Cybercriminals Weaponizing Ransomware Data for BEC AttacksAttacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated...
How and Why to Apply OSINT to Protect the Enterprise
How and Why to Apply OSINT to Protect the EnterpriseHere's how to flip the tide and tap open source intelligence to protect your users.Leer másDark ReadingHere's...
Anonymous poop gifting site hacked, customers exposed
Anonymous poop gifting site hacked, customers exposedShitExpress, a web service that lets you send a box of feces along with a personalized message to friends and...
Chinese hackers backdoor chat app with new Linux, macOS malware
Chinese hackers backdoor chat app with new Linux, macOS malwareVersions of a cross-platform instant messenger application focused on the Chinese market known as 'MiMi' have been...
Microsoft is showing ads for Microsoft 365 in Office 2021
Microsoft is showing ads for Microsoft 365 in Office 2021Microsoft is showing ads for Microsoft 365 Family subscriptions to its Office 2021 customers, offering them discounts...
The Week in Ransomware – August 12th 2022 – Attacking the defenders
The Week in Ransomware - August 12th 2022 - Attacking the defendersIt was a very busy week for ransomware news and attacks, especially with the disclosure...
SOVA malware adds ransomware feature to encrypt Android devices
SOVA malware adds ransomware feature to encrypt Android devicesThe SOVA Android banking trojan continues to evolve with new features, code improvements, and the addition of a...
Google fined $60 million over Android location data collection
Google fined $60 million over Android location data collectionThe Australian Competition and Consumer Commission (ACCC) announced that Google was fined $60 million for misleading Australian Android...
Over 9,000 VNC servers exposed online without a password
Over 9,000 VNC servers exposed online without a passwordResearchers have discovered at least 9,000 exposed VNC (virtual network computing) endpoints that can be accessed and used...
Latin America: A region of challenges and opportunities
Latin America: A region of challenges and opportunitiesFrancisco Robayo is a cyber security expert with 15 years of experience in the sector and more than 20...
Callback phishing attacks see massive 625% growth since Q1 2021
Callback phishing attacks see massive 625% growth since Q1 2021Phishing is constantly evolving to bypass user training and email protections, and as threat actors adopt new...
The evolution in and importance of securing the cloud 2022
The evolution in and importance of securing the cloud 2022EXECUTIVE SUMMARY: The adoption of cloud services can catalyze business innovation and growth. More than 90% of...
Windows KB5012170 Secure Boot DBX update may fail with 0x800f0922 error
Windows KB5012170 Secure Boot DBX update may fail with 0x800f0922 errorUsers may see a 0x800f0922 error when trying to install security update KB5012170 on the currently...
Why robotexts are scammers’ favorite new tool
Why robotexts are scammers' favorite new toolContenido de la entradaLeer másProofpoint News Feed
Russian hackers target Ukraine with default Word template hijacker
Russian hackers target Ukraine with default Word template hijackerThreat analysts monitoring cyberattacks on Ukraine report that the operations of the notorious Russian state-backed hacking group 'Gamaredon'...


















