Source: threatpost.com – Author: Nate Nelson Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Targeted attacks on Twilio and Cloudflare...
Ransomware Attacks are on the Rise – Source: threatpost.com
Source: threatpost.com – Author: Nate Nelson Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. After a...
Cybercriminals Are Selling Access to Chinese Surveillance Cameras – Source: threatpost.com
Source: threatpost.com – Author: Nate Nelson Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research...
Twitter Whistleblower Complaint: The TL;DR Version – Source: threatpost.com
Source: threatpost.com – Author: Threatpost Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s...
Firewall Bug Under Active Attack Triggers CISA Warning – Source: threatpost.com
Source: threatpost.com – Author: Threatpost CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP. Software running Palo...
Fake Reservation Links Prey on Weary Travelers – Source: threatpost.com
Source: threatpost.com – Author: Nate Nelson Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and...
iPhone Users Urged to Update to Patch 2 Zero-Days – Source: threatpost.com
Source: threatpost.com – Author: Elizabeth Montalbano Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to...
Google Patches Chrome’s Fifth Zero-Day of the Year – Source: threatpost.com
Source: threatpost.com – Author: Elizabeth Montalbano An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution...
When will AI be fully integrated into cyber security? – Source: www.cshub.com
Source: www.cshub.com – Author: Olivia Powell ChatGPT, a machine learning (ML)-powered chatbot, is rapidly growing across all sectors. The app’s developer, OpenAI, reported that it gained...
We are less than a year away from a cyber attack credited to ChatGPT – Source: www.cshub.com
Source: www.cshub.com – Author: Jonathan Jackson Jonathan Jackson, director of sales engineering APJ at BlackBerry Cybersecurity, writes about why cyber attacks linked to artificial intelligence are...
The role of API inventory in SBOM and cyber security – Source: www.cshub.com
Source: www.cshub.com – Author: Chaim Peer The Software Bill of Materials (SBOM) has become an increasingly important aspect of cyber security and software supply chain management...
The ultimate guide to malware – Source: www.cshub.com
Source: www.cshub.com – Author: Olivia Powell Malware is a fast-growing, ever-evolving threat to cyber security. In the first six months of 2022, over 2.8 billion malware...
The benefits of automating enterprise cyber security – Source: www.cshub.com
Source: www.cshub.com – Author: Seth Adler Based on the current global macroeconomics construct, there is little sign that budgets will rise during H1 2021. That said,...
What is business email compromise? – Source: www.cshub.com
Source: www.cshub.com – Author: Olivia Powell In this article, Cyber Security Hub explores how cyber attackers use threat vectors like phishing, social engineering and ransomware to...
New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets – Source:thehackernews.com
Source: thehackernews.com – Author: . A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to target...
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking – Source:thehackernews.com
Source: thehackernews.com – Author: . May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of...
Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data – Source:thehackernews.com
Source: thehackernews.com – Author: . May 26, 2023Ravie LakshmananData Safety / Cloud Security A new security flaw has been disclosed in the Google Cloud Platform’s (GCP)...
Predator Android Spyware: Researchers Uncover New Data Theft Capabilities – Source:thehackernews.com
Source: thehackernews.com – Author: . Security researchers have detailed the inner workings of the commercial Android spyware called Predator, which is marketed by the Israeli company...
5 Must-Know Facts about 5G Network Security and Its Cloud Benefits – Source:thehackernews.com
Source: thehackernews.com – Author: . 5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low...
New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids – Source:thehackernews.com
Source: thehackernews.com – Author: . May 26, 2023Ravie LakshmananICS/SCADA Security A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial...
Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances – Source:thehackernews.com
Source: thehackernews.com – Author: . May 26, 2023Ravie LakshmananEmail Security / Zero-Day Email protection and network security services provider Barracuda is warning users about a zero-day...
Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananGaming / Server Security A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS) attacks...
Zyxel Issues Critical Security Patches for Firewall and VPN Products – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananNetwork Security / Vulnerability Zyxel has released software updates to address two critical security flaws affecting select firewall...
Cynet Protects Hospital From Lethal Infection – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023The Hacker NewsIncident Response A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The...
New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananEmail Security / Exploit An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted by...
Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananFinancial Security / Cyber Threat A Brazilian threat actor is targeting more than 30 Portuguese financial institutions with...
Webinar with Guest Forrester: Browser Security New Approaches – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023The Hacker NewsBrowser Security / Tech In today’s digital landscape, browser security has become an increasingly pressing issue, making...
Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananEndpoint Security / Cyber Threat The threat actors behind the nascent Buhti ransomware have eschewed their custom payload...
China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected – Source:thehackernews.com
Source: thehackernews.com – Author: . May 25, 2023Ravie LakshmananCyber Threat / Espionage A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations...
CISA warns govt agencies of recently patched Barracuda zero-day – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan CISA warned of a recently patched zero-day vulnerability exploited last week to hack into Barracuda Email Security Gateway (ESG) appliances....





























