Chinese Hackers Targeting Security and Network AppliancesFortinet Patches Zero-Day Exploited by Suspected Beijing Hacking Group UNC3886Chinese threat actors are turning security appliances into penetration pathways, forcing...
European Digital Identity Bill Heads to Final Negotiations
European Digital Identity Bill Heads to Final NegotiationsEuropean Parliament and Council of the EU Set to Engage in TrilogueThe European Parliament approved Thursday legislation creating a...
Sitios web parecidos a Telegram y WhatsApp que distribuyen malware
Sitios web parecidos a Telegram y WhatsApp que distribuyen malwareLos sitios web imitadores de aplicaciones de mensajería instantánea como Telegram y WhatApp se están utilizando para...
Nuevo HinataBot basado en GoLang que explota fallas de enrutadores y servidores para ataques DDoS.
Nuevo HinataBot basado en GoLang que explota fallas de enrutadores y servidores para ataques DDoS.Se ha observado que una nueva red de bots basada en Golang...
Una nueva categoría de seguridad aborda las amenazas transmitidas por Internet
Una nueva categoría de seguridad aborda las amenazas transmitidas por InternetEn el entorno de TI corporativo moderno, que se basa en la conectividad en la nube,...
Nuevo bot HinataBot explota fallas de enrutadores y servidores para ataques DDoS
Nuevo bot HinataBot explota fallas de enrutadores y servidores para ataques DDoSSe ha observado que una nueva red de bots basada en Golang denominada HinataBot aprovecha...
Microsoft parcha Zero-Day utilizado por ransomware
Microsoft parcha Zero-Day utilizado por ransomwareEl martes de parches de marzo Microsoft ha publicado correcciones para 76 vulnerabilidades, incluidas 9 correcciones críticas y dos explotadas […]Read...
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos ChipsGoogle is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of...
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican OfficialsThe advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India,...
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing MalwareCopycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and...
A New Security Category Addresses Web-borne Threats
A New Security Category Addresses Web-borne ThreatsIn the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS AttacksA new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers...
Dangerous Android phone 0-day bugs revealed – patch or work around them now!
Dangerous Android phone 0-day bugs revealed – patch or work around them now!Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs...
THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
THN Webinar: 3 Research-Backed Ways to Secure Your Identity PerimeterThink of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes...
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities Today, an organization’s brand and reputation are intrinsically tied to its data security and privacy protections. Years...
Analysis: Microsoft Patch Tuesday Update for March, 2023
Analysis: Microsoft Patch Tuesday Update for March, 2023Microsoft March “Patch Tuesday” Addresses 86 Security Vulnerabilities Including 2 Known Exploited Vulnerabilities. On March 14th, 2023, Microsoft released...
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS SecuUnlock the power of Cybersecurity Mesh Architecture (CSMA) to enhance SaaS security. Discover how it can improve compliance...
Automating Your Red Team Approach: A Quick Guide
Automating Your Red Team Approach: A Quick GuideYour organization may be prepared for an attack. You may have all the recommended security controls and your employees...
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation Securing Kubernetes workloads is a critical aspect of increasing your overall cluster security. The goal is...
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media Companies
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media CompaniesA criminal complaint was unsealed today...
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’Our thanks to USENIX for publishing...
The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever
The Small Business Fallacy – Why You Need Cybersecurity and Insurance More Than Ever A common misconception of small business owners is that they can fly...
FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work? Federal Communications Commission rules to block illegal text messages. What took you so long? The post...
This March, Keep the Madness on the Court and Out of Your Network
This March, Keep the Madness on the Court and Out of Your NetworkWith March Madness kicking off this week, we wanted to get in on the...
Two Patch Tuesday flaws you should fix right now
Two Patch Tuesday flaws you should fix right nowMicrosoft released its monthly security bulletin this week, covering patches for over 80 vulnerabilities across its products. However,...
SVB collapse is a scammer’s dream: Don’t get caught out
SVB collapse is a scammer’s dream: Don’t get caught outHow cybercriminals can exploit Silicon Valley Bank's downfall for their own ends and at your expense The...
Vishing Campaign Targets Social Security Administration
Vishing Campaign Targets Social Security AdministrationTens of thousands of mailboxes targetedRead MoreTens of thousands of mailboxes targeted
Russian Military Preparing New Destructive Attacks: Microsoft
Russian Military Preparing New Destructive Attacks: MicrosoftOrganizations outside Ukraine could be targetedRead MoreOrganizations outside Ukraine could be targeted
ICO Reprimands Metropolitan Police for Data Snafu
ICO Reprimands Metropolitan Police for Data SnafuNegligence could have caused "significant damage"Read MoreNegligence could have caused "significant damage"
Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
Pro-Russian Winter Vivern APT Targets Governments and Telecom FirmSentinelOne shared details about the new campaign in an advisory published on ThursdayRead MoreSentinelOne shared details about the...





























