Cybercriminals are increasingly using info-stealing malware to target victimsCybercriminals are increasingly shifting from automated scam-as-a-service to more advanced info-stealing malware distributors as the competition for resources...
Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java Framework
Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java FrameworkA critical security vulnerability has been disclosed in the Quarkus Java framework that could be potentially exploited to...
What Developers Need to Fight the Battle Against Common Vulnerabilities
What Developers Need to Fight the Battle Against Common VulnerabilitiesToday's threat landscape is constantly evolving, and now more than ever, organizations and businesses in every sector...
Ransomware attack forces top Indian medical institute into manual mode
Ransomware attack forces top Indian medical institute into manual modeThe All India Institute of Medical Sciences (AIIMS), New Delhi, one of India’s top medical institutes, has...
Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities
Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 EntitiesThe threat actors behind Cuba (aka COLDDRAW) ransomware have received more than $60...
Top 7 CIAM tools
Top 7 CIAM toolsCustomer identity and access management (CIAM), a subset of identity access management (IAM), is used to manage authentication and authorization of account creation...
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, & Windows Zero-Days
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, & Windows Zero-DaysA Barcelona-based surveillanceware vendor named Variston IT is said to have surreptitiously planted spyware on...
500 million WhatsApp mobile numbers up for sale on the dark web
500 million WhatsApp mobile numbers up for sale on the dark webA database of 487 million WhatsApp users’ mobile numbers has been put up for sale...
Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on Servers
Hackers Exploiting Redis Vulnerability to Deploy New Redigo Malware on ServersA previously undocumented Go-based malware is targeting Redis servers with the goal of taking control of...
What the CISA Reporting Rule Means for Your IT Security Protocol
What the CISA Reporting Rule Means for Your IT Security ProtocolThe new Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires CISA to create rules regarding...
Here is why you should have Cobalt Strike detection in place
Here is why you should have Cobalt Strike detection in placeGoogle recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt...
Watch Out! These Android Keyboard Apps With 2 Million Installs Can be Hacked Remotely
Watch Out! These Android Keyboard Apps With 2 Million Installs Can be Hacked RemotelyMultiple unpatched vulnerabilities have been discovered in three Android apps that allow a...
EU Council adopts NIS2 directive to harmonize cybersecurity across member states
EU Council adopts NIS2 directive to harmonize cybersecurity across member statesThe Council of the European Union (EU) has adopted a new cybersecurity directive designed to improve...
The Value of Old Systems
The Value of Old SystemsOld technology solutions – every organization has a few of them tucked away somewhere. It could be an old and unsupported storage...
Meta Received A $275 Million Fine Following the 2021 Massive Data Leak
Meta Received A $275 Million Fine Following the 2021 Massive Data LeakThe investigation into the 2021 massive Facebook data breach resulted in a $275.5 Million fine...
Researchers Disclose Supply-Chain Flaw Affecting IBM Cloud Databases for PostgreSQL
Researchers Disclose Supply-Chain Flaw Affecting IBM Cloud Databases for PostgreSQLIBM has fixed a high-severity security vulnerability affecting its Cloud Databases (ICD) for PostgreSQL product that could...
Website offering spoofing services taken offline after joint operation
Website offering spoofing services taken offline after joint operationJudicial and law enforcement authorities in Europe, Australia, the US, Ukraine, and Canada took down a so-called spoofing...
Russia Hit by New ‘CryWiper’ — Fake Ransomware
Russia Hit by New ‘CryWiper’ — Fake Ransomware A new wiper malware is destroying data on Russian government PCs. Dubbed CryWiper, it pretends to be ransomware. The...
Hackers Sign Android Malware Apps with Compromised Platform Certificates
Hackers Sign Android Malware Apps with Compromised Platform CertificatesPlatform certificates used by Android smartphone vendors like Samsung, LG, and MediaTek have been found to be abused...
CISA Warns of Multiple Critical Vulnerabilities Affecting Mitsubishi Electric PLCs
CISA Warns of Multiple Critical Vulnerabilities Affecting Mitsubishi Electric PLCsThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week released an Industrial Control Systems (ICS) advisory...
ICYMI: Significant Changes to NYDFS Cybersecurity Regulations
ICYMI: Significant Changes to NYDFS Cybersecurity RegulationsReading Time: 7 minutes In March 2017, the first iteration of The New York Department of Financial Services (NYDFS) Cybersecurity...
Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 410’
Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 410’ via the respected security expertise of Robert M. Lee and the superlative illustration talents...
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD Systems
Critical Ping Vulnerability Allows Remote Attackers to Take Over FreeBSD SystemsThe maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting...
AWS releases Wickr, its encrypted messaging service for enterprises
AWS releases Wickr, its encrypted messaging service for enterprisesThe release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to...
Happy Holidays!
Happy Holidays! Dear blog readers, It's been a while since I've last posted a high-quality personal message on my personal blog but the first thing that...
Zero-Day Exploit Prices for Signal Messaging App Are Skyrocketing
Zero-Day Exploit Prices for Signal Messaging App Are SkyrocketingOpZero, a new exploit broker company based in Petersburg, Russia, tripled Zerodium’s offer for an eventual Signal RCE...
Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day Vulnerability
Google Rolls Out New Chrome Browser Update to Patch Yet Another Zero-Day VulnerabilitySearch giant Google on Friday released an out-of-band security update to fix a new...
When Being Attractive Gets Risky – How Does Your Attack Surface Look to an Attacker?
When Being Attractive Gets Risky - How Does Your Attack Surface Look to an Attacker?In the era of digitization and ever-changing business needs, the production environment...
Financial services increasingly targeted for API-based cyberattacks
Financial services increasingly targeted for API-based cyberattacksA report published Monday by cloud services and CDN (content delivery network) platform Akamai said that the financial services industry...
SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars
SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected CarsCybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to...
