By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the...
Day: April 8, 2023
Some use the hoax known as ‘swatting’ to spread misinformation on social media
STEVE INSKEEP, HOST: We have a story that begins with a man named Travis Rothweiler. TRAVIS ROTHWEILER: I can remember being in a meeting. And in...
Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
Mar 31, 2023Ravie LakshmananCyber Espionage / APT The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and the U.S....
Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA ‘Must Patch’ List
The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its ‘Must Patch’ list a Zimbra vulnerability exploited by Russian hackers in attacks targeting NATO...
CISA orders agencies to patch Backup Exec bugs used by ransomware gang
On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors have used in attacks, three of...
Phishing from threat actor TA473 targets US and NATO officials
on April 7, 2023, 1:59 PM EDT Phishing from threat actor TA473 targets US and NATO officials These phishing campaigns are exploiting a Zimbra vulnerability and...
More phishing campaigns are using IPFS network protocol
Learn how IPFS is used in phishing attacks and why it’s especially tricky to remove the impacted pages, as well as how to protect from this...
Cyberespionage threat actor APT43 targets US, Europe, Japan and South Korea
Image: Getty Images/iStockphoto/bluebay2014 Security research from Mandiant and Google indicates that targeting by APT43 and its subset Archipelago aligns with North Korean interests. Jump to: Who...
Company that launched 2FA is pioneering AI for digital identity
Image: Who is Danny/Adobe Stock Joe Burton, CEO of digital identity authentication company Telesign, spoke with TechRepublic about how the “fuzzy” realm between statistical analysis and...
Apple addressed two actively exploited zero-day flaws
Apple released emergency security updates to address two actively exploited zero-day vulnerabilities impacting iPhones, Macs, and iPads. Apple has released emergency security updates to address two...
Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike
Microsoft announced it has taken legal action to disrupt the illegal use of copies of the post-exploitation tool Cobalt Strike by cybercriminals. Cobalt Strike is a paid...
Almost Half of Former Employees Say Their Passwords Still Work
An alarming number of organizations are not properly offboarding employees when they leave, especially in regard to passwords. In a March PasswordManager.com survey of 1,000 U.S....
Microsoft, Fortra & Health-ISAC Team Up to Remove Illicit Cobalt Strike Tools
Microsoft’s Digital Crimes Unit (DCU), security software vendor Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC), have joined forces to remove cracked legacy copies...
TikTok, Other Mobile Apps Violate Privacy Regulations
The popular and increasingly controversial social media app TikTok must pay a fine of 12.7 million pounds (equivalent to around $16 million) in the UK for...
Printers Pose Persistent Yet Overlooked Threat
A rash of printer-related vulnerabilities in 2023 have punctuated security expert warnings that printers continue to be a significant source of vulnerability within companies — especially...
Bad Actors Will Use Large Language Models — but Defenders Can, Too
AI is dominating headlines. ChatGPT, specifically, has become the topic du jour. Everyone is taken by the novelty, the distraction. But no one is addressing the elephant...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
Friday Squid Blogging: Squid Food Poisoning
University of Connecticut basketball player Jordan Hawkins claims to have suffered food poisoning from calamari the night before his NCAA finals game. The restaurant disagrees: On...
AI and cyber security: Trends, challenges and future prospects
Yaniv Shechtman has over 15 years of expertise in cyber security, AI, and product management. At Check Point, Yaniv’s primary responsibility is to shape Check Point’s...
Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware
EXECUTIVE SUMMARY: Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and other partners have announced a widespread technical and legal crackdown against servers hosting “cracked”...
Best Patch Management Practices to Follow to Keep Your Business Secured
Patch management is an essential practice for businesses to maintain the security and stability of their IT infrastructure. Patches are released by software vendors to fix...
Cyber Incident Cripples UK Criminal Records Office
After weeks of silence, the UK’s Criminal Records Office (ACRO) has issued a statement saying that the issues with the website that have been ongoing since...
MSI Breach Claimed By Money Message Ransomware Gang
A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as...
What Is a Software Restriction Policy?
In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so...