Source: heimdalsecurity.com – Author: Mihaela Marian A TP-Link Archer A21 (AX1800) consumer-grade WiFi router vulnerability has been used by Mirai botnet to launch DDoS attacks against...
Author:
New LOBSHOT Malware Deployed Via Google Ads – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Google advertisements have been exploited to distribute various types of malware over the past few months. To trick unsuspecting users...
Chinese APT Alloy Taurus Is Back – Linux Variant of PingPull Malware Is Active – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian Across Southeast Asia, Europe and Africa, a new Linux variant of the PingPull malware used by Chinese APT group Alloy...
Stay Ahead of Cyberthreats with Proactive Threat Hunting
In today’s digital age, cyber threats are an ever-present danger to organizations of all sizes. From ransomware attacks to data breaches, the consequences of a successful...
US Company CommScope Hit by Ransomware
Following a ransomware attack back in March, sensitive employee data was compromised at CommScope, a major US telecommunications and IT infrastructure company. The Vice Society ransom gang...
Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional
Rheinmetall, a leading German armaments and technology company, was targeted by a cyberattack over the weekend. The attack, however, did not affect company operations, according to officials....
What Is a Software Restriction Policy?
In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so...
International Cyber Operation Shuts Down Notorious Genesis Market
A global law enforcement crackdown, dubbed Operation Cookie Monster, has led to the take down of one of the world’s biggest criminal marketplaces used by online...
New Threat Uncovered: Rorschach Ransomware – The Fastest Encryptor
Researchers have unveiled a sophisticated and fast ransomware strain called Rorschach, previously undocumented. Malware experts discovered the new ransomware strain after a cyberattack on a U.S.-based company...
15 Million Systems Are Vulnerable to CISA KEV Flaws
Using the Shodan database, IT security researchers were able to track down 15 million vulnerable systems with vulnerabilities from the US cyber security authority CISA’s Known-Exploited-Vulnerabilities-Catalog...
Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts
A zero-day vulnerability in Crown Resorts’ GoAnywhere secure file-sharing server has led to a data breach at the largest gambling and entertainment company in Australia. The...
Best Practices for Effective Identity Lifecycle Management (ILM)
In today’s fast-paced world, identity management has become a crucial aspect of every organization. From securing sensitive data to ensuring compliance with regulations, effective Identity Lifecycle...
Clop Ransomware Exploits Zero-Day Vulnerability to Breach Crown Resorts
A zero-day vulnerability in Crown Resorts’ GoAnywhere secure file-sharing server has led to a data breach at the largest gambling and entertainment company in Australia. The...