Performance of VMware NSX Gateway Firewall on 3rd Gen Intel Xeon Scalable ProcessorsIntroduction Over the past year, pandemic-related uncertainties, the rise of remote work, and a...
Author:
Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities
Cisco IP Phone 6800, 7800, and 8800 Series Web UI VulnerabilitiesMultiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated,...
Why CISOs Should Prioritize Extended Detection & Response (XDR)
Why CISOs Should Prioritize Extended Detection & Response (XDR)In my role as General Manager of the VMware Security Business Unit, I have the privilege of speaking...
Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Vulnerabilities
Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers VulnerabilitiesMultiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082,...
Drupal core – Moderately critical – Access bypass – SA-CORE-2023-004
Drupal core - Moderately critical - Access bypass - SA-CORE-2023-004Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 14∕25 AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:UncommonVulnerability: Access bypassAffected versions: =8.0.0 =9.5.0 =10.0.0 Description: Drupal...
Drupal core – Moderately critical – Information Disclosure – SA-CORE-2023-003
Drupal core - Moderately critical - Information Disclosure - SA-CORE-2023-003Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 13∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Information DisclosureAffected versions: >=8.0.0 =9.5.0 =10.0.0 Description: The...
Drupal core – Moderately critical – Information Disclosure – SA-CORE-2023-002
Drupal core - Moderately critical - Information Disclosure - SA-CORE-2023-002Project: Drupal coreDate: 2023-March-15Security risk: Moderately critical 14∕25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Information DisclosureAffected versions: >=8.0.0 =9.5.0 =10.0.0 Description: The...
Unveiling the Evolution of Royal Ransomware
Unveiling the Evolution of Royal RansomwareWhile the evolution of ransomware techniques is to be expected, the speed at which the Royal Ransomware Group has been able...
VMware and Pwn2Own Vancouver 2023
VMware and Pwn2Own Vancouver 2023Greetings from VMware Security Response Center!! We’re excited to announce that VMware will be returning to Pwn2Own 2023 hosted on March 22nd...
How Russia’s Ukraine War Disrupted the Cybercrime Ecosystem
How Russia's Ukraine War Disrupted the Cybercrime EcosystemWar Upended Russian Brotherhood, Supply, Demand and Pricing, Says Intel AnalystRussia's invasion of Ukraine in 2022 threw Russia's cybercrime...
Fresh Vishing Campaign Targeting South Korean Users
Fresh Vishing Campaign Targeting South Korean UsersVictims Lured Using Loan Offer with a Low Interest RateCriminal hackers are targeting South Koreans with an Android Trojan that...
Lawsuit Against Clinic Seeks Long List of Cyber Improvements
Lawsuit Against Clinic Seeks Long List of Cyber ImprovementsProposed Class Action Filed Over Data Exfiltration Breach Affecting Nearly 442,000An Alabama cardiovascular clinic is facing a proposed...
Hacker Exploits Months-Old Bug to Steal Crypto From ATMs
Hacker Exploits Months-Old Bug to Steal Crypto From ATMsNow-Patched Bug Allowed Thief to Remotely Steal User Passwords, Private KeysBitcoin ATM manufacturer General Bytes suspended its cloud...
Emotet Rises Again: Evades Macro Security via OneNote Attachments
Emotet Rises Again: Evades Macro Security via OneNote AttachmentsThe notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments in...
Researchers Shed Light on CatB Ransomware’s Evasion Techniques
Researchers Shed Light on CatB Ransomware's Evasion TechniquesThe threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade...
New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches
New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain BreachesThis article has not been generated by ChatGPT. 2022 was the year...
Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen
Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials StolenA banking trojan dubbed Mispadu has been linked to multiple spam campaigns targeting countries like Bolivia, Chile, Mexico, Peru, and...
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious AdsA new piece of malware dubbed dotRunpeX is being used to distribute numerous known malware families such as Agent Tesla, Ave...
Bitcoin ATM customers hacked by video upload that was actually an app
Bitcoin ATM customers hacked by video upload that was actually an appAs the misquote goes, "Once is misfortune..." This is the second time, and you know...
Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms
Embracing Biometric Identity Verification: A Look at Belgium and Kuwait TelecomsThe country’s telecom authority has given Telenet, Belgium’s largest cable broadband service provider, permission to utilise...
DNSSEC is the Key to a Healthy Future for the Internet
DNSSEC is the Key to a Healthy Future for the Internet The future of internet connectivity could diverge into two very different outcomes—aggressive monopolization by a...
Identity Fabric: Why it’s Important for Identity Security
Identity Fabric: Why it’s Important for Identity SecurityUnderstand what an identity fabric is and its significance for modern Identity Security. Learn why it's crucial for protecting...
Six Ways to Foster a Security Mindset in Engineering Teams
Six Ways to Foster a Security Mindset in Engineering Teams Human error can be found at the root of the vast majority of cybersecurity breaches. According...
Why You Should Opt Out of Sharing Data With Your Mobile Provider
Why You Should Opt Out of Sharing Data With Your Mobile ProviderA new breach involving data from nine million AT&T customers is a fresh reminder that...
How Hackers are Exploiting Cloud Organizations | Eureka Security
How Hackers are Exploiting Cloud Organizations | Eureka SecurityProtect your organization from data breaches in the cloud. Learn how hackers are accessing sensitive data and growing...
Industry 4.0 vs. Smart Factory: What Will the Future Look Like?
Industry 4.0 vs. Smart Factory: What Will the Future Look Like?It isn’t easy to imagine the process that brings all our things into being. Just think...
USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’
USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’Complete Title:...
The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work
The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors WorkFlashpoint assesses that ChatGPT will lower the barrier to entry for basic hacking tasks,...
How to Ensure Your Development Complies With SOC 2
How to Ensure Your Development Complies With SOC 2Discover what you need to know from a development point of view for SOC 2 compliance. The post...
Police pounce on ‘pompompurin’ – alleged mastermind of BreachForums
Police pounce on 'pompompurin' – alleged mastermind of BreachForumsCrypto laundering service gets cleaned up by police and SVB mess draws in more criminals In Brief A...