5 cyber threats retailers are facing — and how they’re fighting backThere are many reasons retailers are juicy targets for hackers. They earn and handle tremendous...
Day: March 29, 2023
DarkBit puts data from Israel’s Technion university on sale
DarkBit puts data from Israel’s Technion university on saleDarkBit, the group that claimed responsibility for a ransomware attack on Israel’s Technion university, is making good on...
Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discovery
Skyhawk adds ChatGPT functions to enhance cloud threat detection, incident discoveryCloud threat detection and response (CDR) vendor Skyhawk has announced the incorporation of ChatGPT functionality in...
Spera exits stealth to reveal identity-based threat hunting capabilities
Spera exits stealth to reveal identity-based threat hunting capabilitiesThe Israeli identity-based cybersecurity provider Spera is exiting stealth mode to reveal a namesake offering with identity security...
Latin American companies, governments need more focus on cybersecurity
Latin American companies, governments need more focus on cybersecurityFor the first time, over a dozen cybersecurity companies have come together to produce an agnostic study titled...
HP releases Wolf Connect solution for secure remote PC management
HP releases Wolf Connect solution for secure remote PC managementHP Inc. has announced the launch of HP Wolf Connect, a new IT management solution that provides...
Staying safe on OnlyFans: The naked truth
Staying safe on OnlyFans: The naked truthHow content creators and subscribers can embrace the social media platform without (overly) exposing themselves to the potentially toxic brew...
Experts Warn of Self-Funding North Korean Group APT43
Experts Warn of Self-Funding North Korean Group APT43Mandiant says unit is focused on espionage and crypto theftRead MoreMandiant says unit is focused on espionage and crypto...
Just 1% of Cloud Permissions Are Actively Used
Just 1% of Cloud Permissions Are Actively UsedMicrosoft warns of "permissions gap" security threatRead MoreMicrosoft warns of "permissions gap" security threat
Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
Tech Industry Bids to Tackle Cyber-Mercenary EpidemicNew principles designed to disrupt and limit a rapidly growing marketRead MoreNew principles designed to disrupt and limit a rapidly...
ChatGPT Vulnerability May Have Exposed Users’ Payment Information
ChatGPT Vulnerability May Have Exposed Users’ Payment InformationThe breach was caused by a bug in an open-source libraryRead MoreThe breach was caused by a bug in...
Attacks Targeting APIs Increased By 400% in Last Six Months
Attacks Targeting APIs Increased By 400% in Last Six MonthsThe new Salt Security report found that 80% of attacks happened over authenticated APIsRead MoreThe new Salt...
Clop Ransomware Group Exploits GoAnywhere MFT Flaw
Clop Ransomware Group Exploits GoAnywhere MFT FlawThe vulnerability has a CVSS score of 7.2 and was exploited against several companies in the USRead MoreThe vulnerability has...
Google Warns Against Commercial Spyware Exploiting Zero-Days
Google Warns Against Commercial Spyware Exploiting Zero-DaysSpyware vendors facilitated the spread of malware by government-backed threat actorsRead MoreSpyware vendors facilitated the spread of malware by government-backed...
Clipper attacks use Trojanized TOR Browser installers
Clipper attacks use Trojanized TOR Browser installersResearchers discovered malware-laced installers for the TOR browser that is spreading clipper malware in Russia and Eastern Europe. Kaspersky researchers...
Google TAG shares details about exploit chains used to install commercial spyware
Google TAG shares details about exploit chains used to install commercial spywareGoogle’s Threat Analysis Group (TAG) discovered several exploit chains targeting Android, iOS, and Chrome to...
Heimdal® Announces Revolutionary Cybersecurity Platform
Heimdal® Announces Revolutionary Cybersecurity PlatformHeimdal® proudly announces the launch of a pioneering Threat Hunting & Intelligence platform – the Threat-hunting & Action Center. With this entry...
Heimdal® Leading the Cyber-Defense Avant-Garde with Revolutionary Hybrid SOC – CSIRT Solution
Heimdal® Leading the Cyber-Defense Avant-Garde with Revolutionary Hybrid SOC – CSIRT SolutionThe era of uncertainty is about to come to an end… According to Gartner, by...
Warning! 14 Million Customers Impacted by Latitude Financial`s Data Breach
Warning! 14 Million Customers Impacted by Latitude Financial`s Data BreachLatitude Financial Services, the recently breached Australian loan giant, announces that the number of affected people reaches...
Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts
Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown ResortsA zero-day vulnerability in Crown Resorts’ GoAnywhere secure file-sharing server has led to a data breach at the...
Command-and-Control Servers Explained. Techniques and DNS Security Risks
Command-and-Control Servers Explained. Techniques and DNS Security RisksA command-and-control server (C&C) is a computer that threat actors use to send instructions to compromised systems. Their goal...
The Security Vulnerabilities of Message Interoperability
The Security Vulnerabilities of Message InteroperabilityJenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate...
New OpcJacker Malware Distributed via Fake VPN Malvertising
New OpcJacker Malware Distributed via Fake VPN MalvertisingWe discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking...
Azure Serverless Security Risks Exposed by New Study
Azure Serverless Security Risks Exposed by New StudySimulation uncovers hidden features and urges greater user awarenessRead MoreTrend Micro Research, News, PerspectivesSimulation uncovers hidden features and urges...
Nexus Android malware targets 450 financial applications
Nexus Android malware targets 450 financial applicationsLearn how to protect your organization and users from this Android banking trojan. The post Nexus Android malware targets 450...
Google finds more Android, iOS zero-days used to install spyware
Google finds more Android, iOS zero-days used to install spywareGoogle's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day...
Experts call for pause on AI training citing risks to humanity
Experts call for pause on AI training citing risks to humanityAI professors and developers have co-signed an open letter to artificial intelligence labs, calling them to...
Microsoft Defender mistakenly tagging URLs as malicious
Microsoft Defender mistakenly tagging URLs as maliciousMicrosoft Defender is mistakenly flagging legitimate links as malicious, with some customers having already received dozens of alert emails since the issues...
Exclusive interview: TD SYNNEX SVP in honor of Women’s History Month
Exclusive interview: TD SYNNEX SVP in honor of Women’s History MonthIn this exclusive interview, Senior Vice President of Business Development and Security Strategy at TD SYNNEX,...
AI chatbots making it harder to spot phishing emails, say experts
AI chatbots making it harder to spot phishing emails, say expertsPoor spelling and grammar that can help identify fraudulent attacks being rectified by artificial intelligence Chatbots...