Application security, Security
January 26, 2023
Via: CSO OnlineApplication programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current […]
January 9, 2023
Via: TechRadarChatGPT continues filling the headlines – but this time for all the wrong reasons, experts have warned. Cybersecurity researchers from Check Point Research (CPR) have observed the tool being used by cybercriminals to improve – and sometimes build from scratch […]
January 7, 2023
Via: Help Net SecurityTrend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as […]
January 6, 2023
Via: Natalie DunnIn a cybersecurity landscape already reeling from the pandemic, the military conflict between Ukraine and Russia has sent a clear message to companies with a weak cybersecurity strategy. Corporate security and intelligence teams have reported an uptick in cyber investigations, […]
January 4, 2023
Via: TechRadarA new phishing campaign has been discovered targeting cybersecurity professionals and hacking aficionados with the idea of stealing their cryptocurrency and obtaining sensitive identity(opens in new tab) information. At the center of this attack is Flipper Zero – a portable […]
December 22, 2022
Via: Help Net Security72% of IT leaders believe their companies moved to the cloud without properly understanding the skills, maturity curve, and complexities of making it all work securely, according to a recent CloudBolt Software report. The results of the study should be […]
December 17, 2022
Via: TechRadarA newly-discovered phishing campaign has been found using fake copyright infringement notices from Facebook to dupe users into giving away their account details. According to analysts from cybersecurity firm Trustwave, these fake messages claim that the user will have their […]
Data loss, Threats & Malware, Vulnerabilities
December 13, 2022
Via: Security WeekThe social media giant revealed in August that a vulnerability patched in January was exploited to obtain user data before a fix was rolled out. The admission came following reports that the flaw had been exploited to collect data on […]
December 8, 2022
Via: TechRadarApple has announced new features aimed at improving the cybersecurity protections for its customers, both consumers and businesses, including Security Keys, an ability to use third-party physical keys to protect data sitting in the iCloud platform. “For users who opt […]
November 9, 2022
Via: Help Net SecurityEndace has released EndaceFlow, a NetFlow Generator that promotes end-to-end visibility for cybersecurity and network performance monitoring. NetFlow offers a view of network traffic and other information, while continuous packet capture provides detail and granularity of that data. Together, the […]
October 27, 2022
Via: Help Net SecurityCloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects. Having anywhere, anytime access to data and apps gives companies tremendous flexibility in […]
October 24, 2022
Via: The Hacker NewsU.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. “The Daixin Team is a ransomware and data extortion […]
Threats & Malware, Virus & Malware
October 20, 2022
Via: Help Net SecurityAxio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational ransomware preparedness continues to be insufficient to keep pace with new attack vectors. The report reveals that […]
October 11, 2022
Via: Natalie DunnThe age of quantum computing has arrived, and it’s not just another “next step” in computing. Quantum computing will bring about what may prove to be the most significant change yet in cybersecurity. Big tech companies are developing quantum computers […]
October 5, 2022
Via: The Hacker NewsU.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a “Defense Industrial Base (DIB) Sector organization’s enterprise network” as part of a cyber espionage campaign. “[Advanced persistent threat] actors used an open-source toolkit called […]
Threats & Malware, Vulnerabilities
October 4, 2022
Via: Security WeekThe security holes, officially tracked as CVE-2022-41040 and CVE-2022-41082, can allow an attacker to remotely execute arbitrary code with elevated privileges. Researcher Kevin Beaumont named the vulnerabilities ProxyNotShell due to similarities to the Exchange vulnerability dubbed ProxyShell, which has been […]
September 26, 2022
Via: The Hacker NewsCybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data to e-commerce and entertainment. Every organisation that needs to deliver services to their customers and employees must protect their IT ‘network’ – all […]
September 7, 2022
Via: The Hacker NewsThe prolific North Korean nation-state actor known as the Lazarus Group has been linked to a new remote access trojan called MagicRAT. The previously unknown piece of malware is said to have been deployed in victim networks that had been […]
Threats & Malware, Vulnerabilities
September 7, 2022
Via: The Hacker NewsA variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits. “If the devices are compromised, they will be fully controlled by attackers, who could […]
Threats & Malware, Virus & Malware
September 1, 2022
Via: The Hacker NewsThe operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes to an increase in the group’s operational tempo. BianLian, written in the Go programming language, was first discovered in mid-July […]