Technology teams are under more pressure than ever to deliver measurable business success. In practice, this means supporting hybrid computing and fostering robust security controls across the entire infrastructure estate, reducing disruptions and downtime and establishing a backbone for autonomous…
Category: EN
Enhancing Blue Team Defense: The Power of AI
AI is transforming cybersecurity on both sides of the battle. As threat actors use AI to enhance and amplify their attacks, the Blue Teams responsible for identifying security threats in the operating environment are exploring how to leverage large language…
Secure Your Secrets with Effective Rotation
Why Does Secrets Rotation Matter in Cybersecurity? Secrets rotation, a cybersecurity best practice, is a procedure to refresh and modify privileged credentials regularly. It’s a critical facet of managing Non-Human Identities (NHIs) and their associated secrets, a fundamental component of…
Feel Supported by Robust PAM
Can Robust PAM Systems Make a Difference? We delve into the intricacies of Non-Human Identities (NHIs) and Secrets Security Management. A well-configured PAM system, especially for organizations operating, can be the cornerstone of a solid cybersecurity strategy. A Deep Dive…
Adapting to Modern Threats in Cloud Security
Are You Effectively Managing Your Non-Human Identities? For quite a while, organizations have been grappling with numerous cybersecurity challenges. However, one obstacle stands out – the management of Non-Human Identities (NHIs) and their secrets. These NHIs, linked with a unique…
Stay Ahead in Cloud-Native Security
Is Staying Current in Cloud-Native Security Trends Important? Absolutely! Staying ahead in cloud-native security trends is essential for organizations of all sizes and across various industries. Non-Human Identities (NHIs) and their secrets are fundamental to these trends, requiring expertise in…
African multinational telco giant MTN Group disclosed a data breach
African multinational telecommunications company MTN Group disclosed a data breach that exposed subscribers’ personal information. MTN Group Limited is a South African multinational telecommunications company headquartered in Johannesburg. Founded in 1994, it has grown to become Africa’s largest mobile network…
Tesla Users Targeted by Dangerous New Malware: What You Should Know
Tesla has often made headlines lately, but this new problem is not connected to Elon Musk or his cars. Instead, it involves cybercriminals who are trying to steal people’s private information using a dangerous software called Agent Tesla. Here’s…
BSidesLV24 – Ground Truth – Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs
Author/Presenter: Suha Sabi Hussain Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink The post…
Pentagon Director Hegseth Revealed Key Yemen War Plans in Second Signal Chat, Source Claims
In a chat group that included his wife, brother, and personal attorney, U.S. Defence Secretary Pete Hegseth provided specifics of a strike on Yemen’s Iran-aligned Houthis in March, a person familiar with the situation told Reuters earlier this week. …
Pune Company Falls Victim to ₹6.49 Crore Cyber Fraud in Major Man-in-the-Middle Attack
A 39-year-old director of a Mohammedwadi-based firm, which operates in IT services and dry fruit imports, was duped into transferring ₹6.49 crore following a sophisticated Man-in-the-Middle (MitM) cyberattack on March 27. In a MitM scam, cybercriminals secretly intercept communications…
Deepfake ‘doctors’ take to TikTok to peddle bogus cures
Look out for AI-generated ‘TikDocs’ who exploit the public’s trust in the medical profession to drive sales of sketchy supplements This article has been indexed from WeLiveSecurity Read the original article: Deepfake ‘doctors’ take to TikTok to peddle bogus cures
Government officials are kind of bad at the internet
Perhaps no one in the world has made such catastrophic tech flubs this year as U.S. Secretary of Defense Pete Hegseth. The saga started when the editor-in-chief of The Atlantic, Jeffrey Goldberg, reported that he had been mistakenly added to…
2025 Cyber Security Predictions: Navigating the Ever-Evolving Threat Landscape
As we look ahead to 2025, the world of cyber security is set to undergo significant changes. Attackers are becoming increasingly more sophisticated with the use of AI, making phishing… The post 2025 Cyber Security Predictions: Navigating the Ever-Evolving Threat…
New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales
AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals to promote unverified supplements and treatments. These synthetic “doctors” exploit public trust in the medical field, often directing users to purchase products with exaggerated or entirely…
Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models
Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to bypass safety protocols and extract potentially dangerous content from multiple popular AI platforms. These “jailbreaks” affect services from industry leaders including OpenAI, Google, Microsoft, and Anthropic,…
Preventing Unauthorised Recovery of Deleted Files
As far as users are concerned, once a file is removed from their computer, it is forever gone. However, the reality is more complex. The likelihood of recovering a deleted file depends on how it was deleted, as well…
ClickFix Attacks: North Korea, Iran, Russia APT Groups Exploit Social Engineering for Espionage
ClickFix attacks are rapidly becoming a favored tactic among advanced persistent threat (APT) groups from North Korea, Iran, and Russia, particularly in recent cyber-espionage operations. This technique involves malicious websites posing as legitimate software or document-sharing platforms. Targets are enticed…
New Power Parasites Phishing Attack Targeting Energy Companies and Major Brands
A sophisticated phishing campaign dubbed “Power Parasites” has been actively targeting global energy giants and major brands since 2024, according to a comprehensive threat report released this week. The ongoing campaign primarily exploits the names and branding of prominent energy…
DragonForce and Anubis Ransomware Operators Unveils New Affiliate Models
Despite significant disruptions by international law enforcement operations targeting major ransomware schemes, cybercriminal groups continue demonstrating remarkable adaptability in 2025. Two noteworthy ransomware operations, DragonForce and Anubis, have introduced innovative affiliate models designed to expand their reach and increase profitability…