Source: heimdalsecurity.com – Author: Madalina Popovici The Terrapin attack, a newly identified security threat, jeopardizes nearly 11 million SSH servers that are accessible online. Originating from...
Month: January 2024
Major Data Breach at HealthEC Affects Millions – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici HealthEC LLC, a leading provider in health management solutions, experienced a significant data breach, impacting approximately 4.5 million individuals. This...
Black Basta Buster Utilizes Ransomware Flaw to Recover Files – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Gabriella Antal Security research and consulting firm SRLabs exploited a vulnerability in the encryption algorithm of a specific strain of Black Basta...
The source code of Zeppelin Ransomware sold on a hacking forum – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The source code of Zeppelin Ransomware sold on a hacking forum A threat actor announced the sale of the source...
Update your white hat hacking skills with $70 off this training bundle – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Ethical hacking is a useful skill set not just for cybersecurity experts, but for every IT worker. The Ultimate 2020...
Crypto wallet founder loses $125,000 to fake airdrop website – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma A crypto wallet service co-founder shares with the world his agony after losing $125,000 to a crypto scam. The startup...
Ivanti warns critical EPM bug lets hackers hijack enrolled devices – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Ivanti fixed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers hijack...
Russian hackers wiped thousands of systems in KyivStar attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The Russian hackers behind a December breach of Kyivstar, Ukraine’s largest telecommunications service provider, have wiped all systems on the...
Cryptocurrency wallet CEO loses $125,000 in wallet-draining scam – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley Anyone can get scammed. If you think you’re somehow immune to being scammed, then, in my opinion, you’re a prime...
Exposed Secrets are Everywhere. Here’s How to Tackle Them – Source:thehackernews.com
Source: thehackernews.com – Author: . Picture this: you stumble upon a concealed secret within your company’s source code. Instantly, a wave of panic hits as you...
Orange Spain Faces BGP Traffic Hijack After RIPE Account Hacked by Malware – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 05, 2024NewsroomNetwork Security / Malware Mobile network operator Orange Spain suffered an internet outage for several hours on January 3...
Alert: Ivanti Releases Patch for Critical Vulnerability in Endpoint Manager Solution – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 05, 2024NewsroomVulnerability / Network Security Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager (EPM)...
Russian Hackers Had Covert Access to Ukraine’s Telecom Giant for Months – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 05, 2024NewsroomCyber Attack / Data Breach Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm...
New Bandook RAT Variant Resurfaces, Targeting Windows Machines – Source:thehackernews.com
Source: thehackernews.com – Author: . Jan 05, 2024NewsroomMalware / Cyber Espionage A new variant of remote access trojan called Bandook has been observed being propagated via...
New iPhone Exploit Uses Four Zero-Days – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Kaspersky researchers are detailing “an attack that over four years backdoored dozens if not thousands of iPhones, many of which...
Threat Group Using Rare Data Transfer Tactic in New RemcosRAT Campaign – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer 3 Min Read Source: ozrimoz via Shutterstock A threat actor known for repeatedly targeting organizations in Ukraine with...
C3 Complete Acquires Information Security Business Unit of Compliance Solutions Inc. – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE DELRAY BEACH, Fla., Jan. 4, 2024 /PRNewswire-PRWeb/ — C3 Complete, an award-winning provider of technology, telecom, and information security services, today announced that...
Mimecast Acquires User Education Startup Elevate Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Elevate Security raised $18.3 million in venture capital financing and scored investments from the likes of Cisco and CrowdStrike. The...
Google Patches Six Vulnerabilities With First Chrome Update of 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google has released a Chrome 120 update to resolve six vulnerabilities, including four reported by external researchers. The post Google...
Airbus Offering to Buy Atos Cybersecurity Unit for Up to $2 Billion – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs French aerospace giant Airbus could acquire Atos’ cybersecurity unit for up to $2 billion, but discussions are at a preliminary...
4.5 Million Individuals Affected by Data Breach at HealthEC – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire HealthEC says personal information received from business partners was compromised in a July 2023 data breach. The post 4.5 Million...
Beyond Protocols: How Team Camaraderie Fortifies Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Joshua Goldfarb The most efficient and effective teams have healthy and constructive cultures that encourage team members to go above and beyond...
Estes Express Lines Says Personal Data Stolen in Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Estes Express Lines is informing over 21,000 individuals that their personal information was stolen in a ransomware attack. The post...
Hacked Mandiant X Account Abused for Cryptocurrency Theft – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Mandiant’s account on X, formerly Twitter, was hacked and used to lure users to a cryptocurrency phishing site. The post...
RIPE Account Hacking Leads to Major Internet Outage at Orange Spain – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Orange Spain’s internet went down for several hours after its RIPE account was hacked, likely after malware stole the credentials....
Intel Spins Off Enterprise Generative AI Deployment Firm Articul8 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse Intel and the global investment firm DigitalBridge Group have formed an independent generative AI software stack company, Articul8 AI, Inc....
Event Codes for Fun and Profit
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
2023–2030 Australian Cyber Security Strategy
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
EU GDPR Case Book 2023
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard A survey of 214 senior executives involved in cybersecurity decisions found more than half (53%) would replace their entire current...


















