CloudBees flaws in Jenkins server can lead to code executionCloudBees vulnerabilities in the Jenkins open-source automation server can be exploited to achieve code execution on targeted...
Day: March 9, 2023
Airlines and Airports Brace for New TSA Cybersecurity Measures Amidst Persistent Threats
Airlines and Airports Brace for New TSA Cybersecurity Measures Amidst Persistent ThreatsIn the latest move by the Biden administration to strengthen cybersecurity protections for critical infrastructure...
Major Healthcare Data Breach Impacts U.S. House Members
Major Healthcare Data Breach Impacts U.S. House MembersThreat actors breached the DC Health Link network, the healthcare administrator that serves the U.S. House of Representatives. Researchers...
Lazarus Group Hacks South Korean Financial Entity via Zero-Day Vulnerability
Lazarus Group Hacks South Korean Financial Entity via Zero-Day VulnerabilityOver the past year, the Lazarus Group has used flaws in an undisclosed software to breach a...
Putin’s Deepfake Campaign: A New Weapon in the War Against Dissent
Putin’s Deepfake Campaign: A New Weapon in the War Against DissentRussia continues its disinformation campaign around the Ukraine war through advanced social engineering tactics delivered by...
Red Team vs. Blue Team: What Is It?
Red Team vs. Blue Team: What Is It?With cyberattacks seemingly increasing at a high rate, companies have to make sure their details and information are secured...
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting Ukraine and Sigma Rules to Proactively Defend Against Their TTPs
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting Ukraine and Sigma Rules to Proactively Defend Against Their TTPs The...
Examining Ransomware Payments From a Data-Science Lens
Examining Ransomware Payments From a Data-Science LensIn this entry, we discuss case studies that demonstrated how data-science techniques were applied in our investigation of ransomware groups'...
Risk management policy
Risk management policySUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost...
Become your business’s cybersecurity expert
Become your business’s cybersecurity expertLearn a wide variety of topics for a lifetime with this eclectic bundle. The post Become your business’s cybersecurity expert appeared first...
IceFire ransomware now encrypts both Linux and Windows systems
IceFire ransomware now encrypts both Linux and Windows systemsThreat actors linked to the IceFire ransomware operation are now actively targeting Linux systems worldwide with a new dedicated encryptor....
Protecting collocated servers from DDoS attacks using GRE tunnels
Protecting collocated servers from DDoS attacks using GRE tunnelsYou can get DDoS protection remotely for your collocated server using a generic routing encapsulation (GRE) tunnel. We...