Source: www.techrepublic.com – Author: Cedric Pernet Ransomware incidents cause significant harm at many levels, including to physical and mental health; new research from U.K. security think...
Author:
Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor...
Newly Discovered Ivanti Secure VPN Zero-Day Vulnerabilities Allow Chinese Threat Actor to Compromise Systems – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Two zero-day vulnerabilities have been discovered in Ivanti Secure VPN, a popular VPN solution used by organizations worldwide. The vulnerabilities...
ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse...
ZenRAT Malware Targets Windows Users Via Fake Bitwarden Password Manager Installation Package – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Windows operating systems are the target of new malware dubbed ZenRAT by U.S.-based cybersecurity company Proofpoint. The attackers built a...
Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Sergey Nivens/Adobe Stock Open directories are a severe security threat to organizations as they might leak sensitive data, intellectual...
New DarkGate Malware Campaign Hits Companies Via Microsoft Teams – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Get technical details about how this new attack campaign is delivered via Microsoft Teams and how to protect your company...
UK’s NCSC Warns Against Cybersecurity Attacks on AI – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet The National Cyber Security Centre provides details on prompt injection and data poisoning attacks so organizations using machine-learning models can...
Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in...
XLoader Malware Variant Targets MacOS Disguised as OfficeNote App – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet A new variant of malware called XLoader is targeting macOS users. XLoader’s execution, functionalities and distribution are detailed. Image: Sashkin/Adobe...
Major US Energy Company Hit by QR Code Phishing Campaign – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet This QR code phishing campaign is targeting multiple industries and using legitimate services such as Microsoft Bing to increase its...
About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet on August 18, 2023, 3:26 PM EDT About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns About 2,000 Citrix...
Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Image: ronstik/Adobe...
Downfall Vulnerability Affects Millions of Intel CPUs With Strong Data Leak Impact – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Learn technical details about this newly disclosed security vulnerability, as well as mitigation recommendations from the Google researcher who discovered...
ChatGPT Security Concerns: Credentials on the Dark Web and More – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: DIgilife/Adobe Stock As artificial intelligence technology such as ChatGPT continues to improve, so does its potential for misuse by...
UK’s NCSC Publishes New Shadow IT Guidance – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Discover the new shadow IT guidance published by the U.K.’s NCSC. Use this guide to better identify and reduce the...
Europol’s IOCTA 2023 Report Reveals Cybercriminals are Increasingly Interdependent – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: SomYuZu/Adobe Stock The Europol report reported on cybercriminals’ use of cryptocurrencies and how their techniques are more sophisticated. However,...
Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and...
Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: SomYuZu/Adobe Stock Cisco Talos discovered a new Microsoft Windows policy loophole that allows a threat actor to sign malicious...
The Importance of Penetration Testing in Cloud Security – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: sarayut_sy/Adobe Stock In the ever-evolving landscape of cybersecurity, cloud security has emerged as a critical concern for organizations worldwide...
New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Sashkin/Adone Stock New malware dubbed Meduza Stealer can steal information from a large number of browsers, password managers and...
Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet A new report from Kaspersky reveals the top cyber threats for SMBs in 2023. Read more about it and how...
New phishing and business email compromise campaigns increase in complexity, bypass MFA – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and...
Best VPNs for small business in 2023 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet on June 8, 2023, 4:00 PM EDT Best VPNs for small business in 2023 Looking for the best VPN services...
Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...
Chinese state-sponsored attack uses custom router implant to target European governments – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: ArtemisDiana/Adobe Stock Check Point Research released a new report that exposes the activities of a Chinese state-sponsored APT threat...
PaperCut vulnerability abused by several threat actors could impact 70,000 organizations – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Getty Images/iStockphoto Several ransomware groups and state-sponsored cyberespionage threat actors are exploiting a vulnerability affecting printing software tools PaperCut...
Survey: Most CISOs feel their business is at risk for cyberattack – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Piscine26/Adobe Stock According to a new survey of 1,600 chief information security officers from around the world by cybersecurity...
Survey: State of cybersecurity in the UK – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Friends Stock/Adobe Stock The U.K. government recently released its 2023 Cyber Security Breaches survey. The survey provides an interesting...
Google Play threats on the dark web are big business
Android infections are also prevalent on the dark web, according to Kaspersky. Learn how to keep your workforce safe from these mobile and BYOD security threats....