Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos ChipsGoogle is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of...
Day: March 17, 2023
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican OfficialsThe advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India,...
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing MalwareCopycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and...
A New Security Category Addresses Web-borne Threats
A New Security Category Addresses Web-borne ThreatsIn the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS AttacksA new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers...
THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
THN Webinar: 3 Research-Backed Ways to Secure Your Identity PerimeterThink of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes...
Dangerous Android phone 0-day bugs revealed – patch or work around them now!
Dangerous Android phone 0-day bugs revealed – patch or work around them now!Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs...
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities Today, an organization’s brand and reputation are intrinsically tied to its data security and privacy protections. Years...
Analysis: Microsoft Patch Tuesday Update for March, 2023
Analysis: Microsoft Patch Tuesday Update for March, 2023Microsoft March “Patch Tuesday” Addresses 86 Security Vulnerabilities Including 2 Known Exploited Vulnerabilities. On March 14th, 2023, Microsoft released...
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS SecuUnlock the power of Cybersecurity Mesh Architecture (CSMA) to enhance SaaS security. Discover how it can improve compliance...
Automating Your Red Team Approach: A Quick Guide
Automating Your Red Team Approach: A Quick GuideYour organization may be prepared for an attack. You may have all the recommended security controls and your employees...
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation Securing Kubernetes workloads is a critical aspect of increasing your overall cluster security. The goal is...
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media Companies
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media CompaniesA criminal complaint was unsealed today...
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’Our thanks to USENIX for publishing...
The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever
The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever A common misconception of small business owners is that they can fly...
FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work? Federal Communications Commission rules to block illegal text messages. What took you so long? The post...
This March, Keep the Madness on the Court and Out of Your Network
This March, Keep the Madness on the Court and Out of Your NetworkWith March Madness kicking off this week, we wanted to get in on the...
Two Patch Tuesday flaws you should fix right now
Two Patch Tuesday flaws you should fix right nowMicrosoft released its monthly security bulletin this week, covering patches for over 80 vulnerabilities across its products. However,...
SVB collapse is a scammer’s dream: Don’t get caught out
SVB collapse is a scammer’s dream: Don’t get caught outHow cybercriminals can exploit Silicon Valley Bank's downfall for their own ends and at your expense The...
Vishing Campaign Targets Social Security Administration
Vishing Campaign Targets Social Security AdministrationTens of thousands of mailboxes targetedRead MoreTens of thousands of mailboxes targeted
Russian Military Preparing New Destructive Attacks: Microsoft
Russian Military Preparing New Destructive Attacks: MicrosoftOrganizations outside Ukraine could be targetedRead MoreOrganizations outside Ukraine could be targeted
ICO Reprimands Metropolitan Police for Data Snafu
ICO Reprimands Metropolitan Police for Data SnafuNegligence could have caused "significant damage"Read MoreNegligence could have caused "significant damage"
Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
Pro-Russian Winter Vivern APT Targets Governments and Telecom FirmSentinelOne shared details about the new campaign in an advisory published on ThursdayRead MoreSentinelOne shared details about the...
Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips
Google Exposes 18 Zero-Day Flaws in Samsung Exynos ChipsFour of these vulnerabilities enabled potential attackers to perform remote code executionRead MoreFour of these vulnerabilities enabled potential...
Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
Telegram, WhatsApp Trojanized to Target Cryptocurrency WalletsMost of these apps rely on clipper malware to steal the contents of the Android clipboardRead MoreMost of these apps...
China-linked APT likely linked to Fortinet zero-day attacks
China-linked APT likely linked to Fortinet zero-day attacksAn alleged Chinese threat actor group is behind attacks on government organizations exploiting a Fortinet zero-day flaw (CVE-2022-41328). A...
Top 5 Insider Threats to Look Out For in 2023
Top 5 Insider Threats to Look Out For in 2023Unquestionably, ‘insider threats’ is one of the most neglected aspects of cybersecurity and some companies fail to...
HinataBot, a new Go-Based DDoS botnet in the threat landscape
HinataBot, a new Go-Based DDoS botnet in the threat landscapeA new Golang-based DDoS botnet, tracked as HinataBot, targets routers and servers by exploiting known vulnerabilities. Akamai researchers spotted...
Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford U
Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford UThe Cl0p ransomware gang claimed dozens of new victims in the past 24 hours, including...
Weekly Update 339
Weekly Update 339Why can't I audio right? It's my 339th video and I still make mistakes ? But it came good and we got a decent...