The Ongoing Rise in IoT Attacks: What We’re Seeing in 2023As more everyday items become connected through the Internet of Things, the cyber risk landscape changes....
Why Backups and Encryption Go Hand in Hand
Why Backups and Encryption Go Hand in Hand Data sits front and center of any business. And it’s being generated in ever greater volumes. An estimated...
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3Key Points Xloader is a popular information stealing malware family that is the successor to Formbook. In early...
Enhancing observability with IAST | AppSec | Contrast Security
Enhancing observability with IAST | AppSec | Contrast Security Observability has become crucial in software engineering as modern applications grow more complex and distributed. The rise...
Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity
Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity The post Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity appeared first on Security Boulevard. Read MoreSecurity...
Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites
Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites UK National Crime Agency nips it in the bud: Aims to scare straight naughty DDoS kiddies....
DXC Technology says global network is not compromised following Latitude Financial breach
DXC Technology says global network is not compromised following Latitude Financial breachSoon after Latitude Financial revealed it suffered a cyber attack, DXC Technology quietly published a...
APT group Winter Vivern exploits Zimbra webmail flaw to target government entities
APT group Winter Vivern exploits Zimbra webmail flaw to target government entitiesAn APT group known in the security industry as Winter Vivern has been exploiting a...
3CX DesktopApp compromised by supply chain attack
3CX DesktopApp compromised by supply chain attack3CX is working on a software update for its 3CX DesktopApp, after multiple security researchers alerted the company of an...
Kyndryl lays off staff in search of efficiency
Kyndryl lays off staff in search of efficiencyThe layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.Read MoreCSO OnlineThe...
Thieves Steal $9m from Crypto Liquidity Pool
Thieves Steal $9m from Crypto Liquidity PoolSafeMoon claims exploited vulnerability was to blameRead MoreSafeMoon claims exploited vulnerability was to blame
NCA Celebrates Multimillion-Pound Fraud Takedowns
NCA Celebrates Multimillion-Pound Fraud TakedownsAgency says it has seized hundreds of assets in month-long operationRead MoreAgency says it has seized hundreds of assets in month-long operation
Volume of HTTPS Phishing Sites Surges 56% Annually
Volume of HTTPS Phishing Sites Surges 56% AnnuallyScammers are increasingly trying to legitimize their effortsRead MoreScammers are increasingly trying to legitimize their efforts
FDA Protects Medical Devices Against Cyber-Threats With New Measures
FDA Protects Medical Devices Against Cyber-Threats With New MeasuresNew medical devices applications should "monitor, identify, and address" cybersecurity issuesRead MoreNew medical devices applications should "monitor, identify,...
Over 70% of Employees Keep Work Passwords on Personal Devices
Over 70% of Employees Keep Work Passwords on Personal Devices95% of security leaders are also concerned about phishing attacks via private messaging appsRead More95% of security...
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain AttacksWindows and Mac versions of the software were compromised to deliver infostealersRead MoreWindows and Mac versions...
New Mélofée Linux malware linked to Chinese APT groups
New Mélofée Linux malware linked to Chinese APT groupsExatrack researchers warn of an unknown China-linked hacking group that has been linked to a new Linux malware,...
3CX voice and video conferencing software victim of a supply chain attack
3CX voice and video conferencing software victim of a supply chain attackPopular voice and video conferencing software 3CX was the victim of a supply chain attack,...
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service Sites
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service SitesThe National Crime Agency (NCA) from the U.K. launched several fake DDoS-as-a-service sites. The aim is to gather...
APT43: A New Cyberthreat From North Korea
APT43: A New Cyberthreat From North KoreaA new North Korean cyber operator has been attributed to a series of attacks conducted to gather strategic intelligence aligned...
What Is User Provisioning?
What Is User Provisioning?User provisioning (also known as account provisioning) is a digital Identity and Access Management (IAM) process that involves creating employee/user accounts and their...
Companies Affected by Ransomware [2022-2023]
Companies Affected by Ransomware [2022-2023]The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world,...
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex Stay alert! Adversaries set eyes on Aspena Faspex, an IBM file-exchange application frequently...
US sends million-dollar scammer to prison for four years
US sends million-dollar scammer to prison for four years31-year-old Solomon Ekunke Okpe, of Lagos, was a member of a gang that devised and executed a variety...
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrencyMalware, disguised as copies of Tor, has stolen approximately US $400,000 worth of cryptocurrency from almost 16,000 users...
Mac Malware MacStealer Spreads as Fake P2E Apps
Mac Malware MacStealer Spreads as Fake P2E AppsWe detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure...
New AlienFox toolkit steals credentials for 18 cloud services
New AlienFox toolkit steals credentials for 18 cloud servicesA new modular toolkit called 'AlienFox' allows threat actors to scan for misconfigured servers to steal authentication secrets...
Bing search results hijacked via misconfigured Microsoft app
Bing search results hijacked via misconfigured Microsoft appA misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject...
Why AI is becoming more powerful: Implications for business & society
Why AI is becoming more powerful: Implications for business & societyProfessional bio: Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office...
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics• Documents leaked by whistleblower angry over Ukraine war • Private Moscow consultancy bolstering Russian cyberwarfare •...





























