Category: EN

Ransomware crews investing in custom data stealing malware

BlackByte, LockBit among the criminals using bespoke tools As ransomware crews increasingly shift beyond just encrypting victims’ files and demanding a payment to unlock them, instead swiping sensitive info straight away, some of the more mature crime organizations are developing…

A new flaw in OpenSSH can lead to remote code execution

A vulnerability affects some versions of the OpenSSH secure networking suite, it can potentially lead to remote code execution. The vulnerability CVE-2024-6409 (CVSS score: 7.0) impacts select versions of the OpenSSH secure networking suite, it can be exploited to achieve…

Deepfake Threats and Biometric Security Vulnerabilities

Grasping how biometric attacks work is crucial for organizations to make informed decisions based on actual threat intelligence. The post Deepfake Threats and Biometric Security Vulnerabilities appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Mirantis OpenStack for Kubernetes 24.2 automates workload distribution

Mirantis announced Mirantis OpenStack for Kubernetes (MOSK) 24.2 with an exclusive dynamic resource balancer feature that automates workload distribution to solve hotspot and “noisy neighbor” problems. Now, MOSK automatically redistributes workloads within a cluster helping to balance resource consumption to…

Persistent npm Campaign Shipping Trojanized jQuery

Approximately 68 malicious packages were created between May 26 and June 23, 2024, with deceptive names like cdnjquery and jquertyi. These packages were manually crafted, unlike automated attacks, allowing the threat actor to steal website form data. This article has…

Most Security Pros Admit Shadow SaaS and AI Use

Next DLP study finds majority of security professionals have used unauthorised apps in past year This article has been indexed from www.infosecurity-magazine.com Read the original article: Most Security Pros Admit Shadow SaaS and AI Use

Sextortion Scams – How They Persuade and What to Watch for

“Sextortion” scams represent some of cybercriminals’ most brazen attempts to extract money from unwitting victims. These extortion techniques rely on fear and shame to get targets to pay up. Similar to individualized ransomware attacks, if the party refuses to pay…

Microsoft Fixes Four Zero-Days in July Patch Tuesday

Microsoft has addressed two actively exploited and two publicly disclosed zero-day bugs this month This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Four Zero-Days in July Patch Tuesday