Category: EN

Credit Unions Replaced Fragmented Tools With Seceon’s Platform

Credit unions are the financial lifeline for more than 139 million Americans. Built on a member-first philosophy, these not-for-profit institutions provide affordable banking, community trust, and financial empowerment. But in today’s digital-first era, credit unions face growing cybersecurity challenges. With…

Unmasking the Insider Seller: Dark Web Attribution

Nisos Unmasking the Insider Seller: Dark Web Attribution Most insider threat teams know what to watch for inside the network: unusual access requests, suspicious file movement, or behavior changes that trip internal tools… The post Unmasking the Insider Seller: Dark…

Cisco Patches Zero-Day Flaw Affecting Routers and Switches

The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user. The post Cisco Patches Zero-Day Flaw Affecting Routers and Switches appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

North Korean IT workers use fake profiles to steal crypto

ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active in recent years and focuses on stealing cryptocurrency. It targets freelance developers working on Windows, Linux, and macOS systems. A…

Steam Confirms Malware Found in BlockBlasters Game

Steam has officially confirmed that malware was discovered in the popular indie game BlockBlasters. The announcement follows widespread player reports and security scans that flagged unusual activity in the game’s files. This incident raises concerns about game security and digital…

Three in four European companies are hooked on US tech

Secure your data, avoid US sanctions, and stay compliant with European cybersecurity alternatives Partner Content  What happens when your company’s future depends on a service controlled by another country that loves trade fights, tariffs, and industrial-scale surveillance? That’s the risk…

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data

Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists, and snapshots. Attackers automate scans across IP ranges, appending a base64-encoded “auth” parameter to management URLs. When decoded, the string…

LNK Malware Leverages Legit Windows Files to Slip Past Defenses

In a recently observed campaign emerging from Israel, threat actors have revived the use of Windows shortcut (.LNK) files to deliver a potent Remote Access Trojan (RAT). These seemingly innocuous shortcut files exploit Living-off-the-Land Binaries (LOLBins) such as odbcconf.exe to…