Top

LATEST PUBLICATIONS



5G can reduce – but also create – security risk

November 23, 2022

As 5G connections are rapidly spreading, more and more questions and misconceptions are arising. What are the most common ones and how can they affect security teams? 5G is a comparatively new technology and many cybersecurity teams have not had […]


Cloud data protection trends you need to be aware of

November 16, 2022

Veeam Software released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery […]


EndaceFlow protects customers against network attacks

November 9, 2022

Endace has released EndaceFlow, a NetFlow Generator that promotes end-to-end visibility for cybersecurity and network performance monitoring. NetFlow offers a view of network traffic and other information, while continuous packet capture provides detail and granularity of that data. Together, the […]


Threats & Malware, Virus & Malware

LodaRAT Malware Resurfaces with New Variants Employing Updated Functionalities

November 18, 2022

Via: The Hacker News

The LodaRAT malware has resurfaced with new variants that are being deployed in conjunction with other sophisticated malware, such as RedLine Stealer and Neshta. “The ease of access to its source code makes LodaRAT an attractive tool for any threat […]


Threats & Malware, Vulnerabilities

Omron PLC Vulnerability Exploited by Sophisticated ICS Malware

November 18, 2022

Via: Security Week

On November 10, the US Cybersecurity and Infrastructure Security Agency (CISA) published two advisories describing three vulnerabilities affecting NJ and NX-series controllers and software made by Japanese electronics giant Omron. One of the advisories describes CVE-2022-33971, a high-severity flaw that […]


Cyber-crime, Malware

Microsoft Warns of Cybercrime Group Delivering Royal Ransomware, Other Malware

November 18, 2022

Via: Security Week

DEV-0569 has been relying on malicious ads (malvertising), blog comments, fake forum pages, and phishing links for the distribution of malware. Over the past few months, however, Microsoft noticed that the threat actor has started using contact forms to deliver […]


Threats & Malware, Vulnerabilities

Atlassian Patches Critical Vulnerabilities in Bitbucket, Crowd

November 18, 2022

Via: Security Week

In the Bitbucket source code repository hosting service, Atlassian fixed CVE-2022-43781, a critical command injection vulnerability that affects Bitbucket Server and Data Center version 7 and, in some cases, version 8. “There is a command injection vulnerability using environment variables […]


Mobile, Mobile security

Android security: Which smartphones can enterprises trust?

November 17, 2022

Via: CSO Online

Google’s Android operating system dominates smartphone usage throughout the world — in every region except North America and Oceania, in fact. Thus, businesses in many regions are likely to support and issue Android devices to employees as their mainstay mobile […]


Cyber warfare, Cyber-crime

Iranian Hackers Compromised a U.S. Federal Agency’s Network Using Log4Shell Exploit

November 17, 2022

Via: The Hacker News

Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of the Log4Shell vulnerability in an unpatched VMware Horizon server. The details, which were shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), […]