Source: www.bleepingcomputer.com – Author: Bill Toulas KeePass has released version 2.54, fixing the CVE-2023-32784 vulnerability that allows the extraction of the cleartext master password from the...
Month: June 2023
The Genesis Market Takedown – Keep Users Credentials Secure – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software For years, “dark” markets have contained stolen credentials for sale. One of the larger and more notorious markets...
Microsoft links Clop ransomware gang to MOVEit data-theft attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Microsoft has linked the Clop ransomware gang to recent attacks exploiting a zero-day vulnerability in the MOVEit Transfer platform to...
Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 SAN FRANCISCO & LONDON — June 5, 2023 — Red Sift, the leading Digital Resilience Platform enabling organizations to see, solve,...
Microsoft Links MOVEit Attack to Cl0p as British Airways, BBC Fall – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading As the names of the first known victims of the MOVEit zero-day exploitation started to roll...
2.5M Impacted by Enzo Biochem Data Leak After Ransomware Attack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading After facing a ransomware attack at the hands of hackers who breached its computer systems, Enzo Biochem...
Gigabyte Slams Backdoor Shut With Attack-Killing BIOS Update – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Gigabyte has released a BIOS update with increased security following the discovery of an inadvertent system backdoor...
Moonlighter Satellite Offers In-Orbit Target for Space Hackers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Satellite hacking is set to blast off to new frontiers when Moonlighter, billed as the “world’s first...
Don’t Overlook Twitter’s Trove of Threat Intel for Enterprise Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading Tagged, organized, and free for anyone who wants it, social media posts and data are an underused threat...
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading A threat group with likely links to the financially motivated group known as FIN11 and other...
After ‘Inception’ Attack, New Due Diligence Requirements Are Needed – Source: www.darkreading.com
Source: www.darkreading.com – Author: Carlos Morales, Senior Vice President of Solutions, Vercara Researchers investigating a supply chain attack disclosed by 3CX in March found it had an unusual...
Varonis: Reducing Insider Threats Through Improved Data Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Terry Sweeney, Contributing Editor Data is the most valuable asset for any organization. As the Pentagon breach shows, it only takes one...
Name That Edge Toon: Spring Chickens – Source: www.darkreading.com
Source: www.darkreading.com – Author: John Klossner, Cartoonist Hatch a witty cybersecurity-related caption to explain the scene above, and the most eggcellent (as deemed by our editors)...
RomCom ransomware is being spread via poisoned Google ads
RomCom ransomware is being spread via poisoned Google adverts for legitimate software companies including Chat-GPT, PDF Reader Pro and Devolutions’ Remote Desktop Manager. According to researchers...
Dozens of Malicious Extensions Found in Chrome Web Store – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...
What if the Current AI Hype Is a Dead End? – Source: www.securityweek.com
Source: www.securityweek.com – Author: Oliver Rochford As I discussed in my previous column on Cybersecurity Futurism for Beginners, we are applying methods and approaches commonly used...
Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Microsoft on Friday announced that SMB signing is now a default requirement in Windows 11 Enterprise editions, starting with insider...
Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Taiwan-based networking device manufacturer Zyxel is urging customers to update the firmware of ATP, USG Flex, VPN, and ZyWALL/USG firewall...
Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Taiwanese computer components maker Gigabyte has announced BIOS updates meant to remove a backdoor feature that was recently found in...
SBOMs – Software Supply Chain Security’s Future or Fantasy? – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Two years after the requirement for Software Bills of Materials (SBOMs) were announced, we are nowhere near achieving them. Are...
Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The recent MOVEit zero-day attack has been linked to a known ransomware group, which has reportedly exploited the vulnerability to...
Cybersecurity M&A Roundup: 36 Deals Announced in May 2023 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Thirty-six cybersecurity-related merger and acquisition (M&A) deals were announced in May 2023. An analysis conducted by SecurityWeek shows that more...
Clop ransomware gang exploits the MOVEit Transfer vulnerability to steal data – Source: www.csoonline.com
Source: www.csoonline.com – Author: At least one organization, UK payroll provider Zellis, has confirmed a breach via the MOVEit utility. More information is coming to light...
BrandPost: How the combination of XDR and SIEM can improve SOC operations – Source: www.csoonline.com
Source: www.csoonline.com – Author: About | When you have comprehensive security, the future is yours to build. Learn about the strategies and solutions to secure your...
Atomic Wallet hack leads to at least $35M in stolen crypto assets – Source: www.csoonline.com
Source: www.csoonline.com – Author: The biggest victim of the cryptocurrency hack on Atomic Wallet was an individual who reportedly lost $7.95 million in Tether. D. Keine...
SAFE Security claims to predict data breaches with new generative AI offering – Source: www.csoonline.com
Source: www.csoonline.com – Author: SAFE Security’s Cyber Risk Cloud of Clouds generates likelihoods for different risk scenarios based on an organization’s cybersecurity posture. AI-based cyber risk...
CISOs, IT lack confidence in executives’ cyber-defense knowledge – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cybercriminals target senior executives, but IT security professionals say these executives are unprepared to defend their devices, software, and home network. By...
Governments worldwide grapple with regulation to rein in AI dangers – Source: www.computerworld.com
Source: www.computerworld.com – Author: As generative AI revolutionizes tech, governments around the world are trying to come up with regulations that encourage its benefits while minimizing...
Federal cyber incidents reveal challenges of implementing US National Cybersecurity Strategy – Source: www.csoonline.com
Source: www.csoonline.com – Author: As federal government cybersecurity incidents continue to mount, the Biden administration’s National Cybersecurity Strategy should help, although experts say implementing it won’t...
10 notable critical infrastructure cybersecurity initiatives in 2023 – Source: www.csoonline.com
Source: www.csoonline.com – Author: How vendors, governments, industry bodies, and nonprofits are contributing to increasing the cyber resilience of critical national infrastructure this year. The security...

















