Top

Tag: Cybersecurity


Application security, Security

9 API security tools on the frontlines of cybersecurity

January 26, 2023

Via: CSO Online

Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current […]


Hacker, Threats & Malware

Hackers are using ChatGPT to write malware

January 9, 2023

Via: TechRadar

ChatGPT continues filling the headlines – but this time for all the wrong reasons, experts have warned. Cybersecurity researchers from Check Point Research (CPR) have observed the tool being used by cybercriminals to improve – and sometimes build from scratch […]


Mobile, Wireless security

Trend Micro establishes new subsidiary for 5G cybersecurity

January 7, 2023

Via: Help Net Security

Trend Micro has established CTOne, a new Trend Micro subsidiary focused on advancing 5G network security and beyond. The group’s intellectual capital and leadership come from Trend Micro’s culture of innovation and is the latest incubation project to launch as […]


Editorial

Cybersecurity During Wartime

January 6, 2023

Via: Natalie Dunn

In a cybersecurity landscape already reeling from the pandemic, the military conflict between Ukraine and Russia has sent a clear message to companies with a weak cybersecurity strategy. Corporate security and intelligence teams have reported an uptick in cyber investigations, […]


Cyber-crime, Phishing

This new phishing campaign is targeting security experts across the globe

January 4, 2023

Via: TechRadar

A new phishing campaign has been discovered targeting cybersecurity professionals and hacking aficionados with the idea of stealing their cryptocurrency and obtaining sensitive identity(opens in new tab) information. At the center of this attack is Flipper Zero – a portable […]


Cloud security, Security

Dealing with cloud security shortfalls

December 22, 2022

Via: Help Net Security

72% of IT leaders believe their companies moved to the cloud without properly understanding the skills, maturity curve, and complexities of making it all work securely, according to a recent CloudBolt Software report. The results of the study should be […]


Cyber-crime, Phishing

This devious phishing campaign uses Facebook messages to trick its victims

December 17, 2022

Via: TechRadar

A newly-discovered phishing campaign has been found using fake copyright infringement notices from Facebook to dupe users into giving away their account details. According to analysts from cybersecurity firm Trustwave, these fake messages claim that the user will have their […]


Data loss, Threats & Malware, Vulnerabilities

Twitter Responds to Recent Data Leak Reports

December 13, 2022

Via: Security Week

The social media giant revealed in August that a vulnerability patched in January was exploited to obtain user data before a fix was rolled out. The admission came following reports that the flaw had been exploited to collect data on […]


Mobile, Mobile security

Apple really wants you to use a physical security key for Apple ID

December 8, 2022

Via: TechRadar

Apple has announced new features aimed at improving the cybersecurity protections for its customers, both consumers and businesses, including Security Keys, an ability to use third-party physical keys to protect data sitting in the iCloud platform. “For users who opt […]


Network security, Security

EndaceFlow protects customers against network attacks

November 9, 2022

Via: Help Net Security

Endace has released EndaceFlow, a NetFlow Generator that promotes end-to-end visibility for cybersecurity and network performance monitoring. NetFlow offers a view of network traffic and other information, while continuous packet capture provides detail and granularity of that data. Together, the […]


Cloud security, Security

Cloud security made simple in new guidebook for lean teams

October 27, 2022

Via: Help Net Security

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects. Having anywhere, anytime access to data and apps gives companies tremendous flexibility in […]


Hacker, Threats & Malware

CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware

October 24, 2022

Via: The Hacker News

U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. “The Daixin Team is a ransomware and data extortion […]


Threats & Malware, Virus & Malware

Ransomware preparedness: What are you doing wrong?

October 20, 2022

Via: Help Net Security

Axio released its 2022 State of Ransomware Preparedness research report, revealing that although notable improvements have been made since Axio’s 2021 report, organizational ransomware preparedness continues to be insufficient to keep pace with new attack vectors. The report reveals that […]


Editorial

Quantum Menace: Looking at Quantum Computing Through a Cybersecurity Lens

October 11, 2022

Via: Natalie Dunn

The age of quantum computing has arrived, and it’s not just another “next step” in computing. Quantum computing will bring about what may prove to be the most significant change yet in cybersecurity. Big tech companies are developing quantum computers […]


Hacker, Threats & Malware

FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization

October 5, 2022

Via: The Hacker News

U.S. cybersecurity and intelligence agencies on Tuesday disclosed that multiple nation-state hacking groups potentially targeted a “Defense Industrial Base (DIB) Sector organization’s enterprise network” as part of a cyber espionage campaign. “[Advanced persistent threat] actors used an open-source toolkit called […]


Threats & Malware, Vulnerabilities

Mitigation for ProxyNotShell Exchange Vulnerabilities Easily Bypassed

October 4, 2022

Via: Security Week

The security holes, officially tracked as CVE-2022-41040 and CVE-2022-41082, can allow an attacker to remotely execute arbitrary code with elevated privileges. Researcher Kevin Beaumont named the vulnerabilities ProxyNotShell due to similarities to the Exchange vulnerability dubbed ProxyShell, which has been […]


Network security, Security

5 Network Security Threats And How To Protect Yourself

September 26, 2022

Via: The Hacker News

Cybersecurity today matters so much because of everyone’s dependence on technology, from collaboration, communication and collecting data to e-commerce and entertainment. Every organisation that needs to deliver services to their customers and employees must protect their IT ‘network’ – all […]


Cyber warfare, Cyber-crime

North Korean Hackers Deploying New MagicRAT Malware in Targeted Campaigns

September 7, 2022

Via: The Hacker News

The prolific North Korean nation-state actor known as the Lazarus Group has been linked to a new remote access trojan called MagicRAT. The previously unknown piece of malware is said to have been deployed in victim networks that had been […]


Threats & Malware, Vulnerabilities

Mirai Variant MooBot Botnet Exploiting D-Link Router Vulnerabilities

September 7, 2022

Via: The Hacker News

A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking advantage of multiple exploits. “If the devices are compromised, they will be fully controlled by attackers, who could […]


Threats & Malware, Virus & Malware

Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks

September 1, 2022

Via: The Hacker News

The operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes to an increase in the group’s operational tempo. BianLian, written in the Go programming language, was first discovered in mid-July […]