Category: EN

These were the badly handled data breaches of 2024

Blaming victims, months of silence, and suing security researchers all featured in cybersecurity in 2024. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: These…

Securing Remote OT Operations:

Expanded attack surfaces have made OT systems a target for cyber threats, underscoring the need for a security framework tailored to remote OT environments. The post Securing Remote OT Operations: appeared first on Palo Alto Networks Blog. This article has…

The Intersection of AI and OSINT: Advanced Threats On The Horizon

Artificial Intelligence (A) is revolutionizing intelligence gathering, empowering cybersecurity defenders, and amplifying threat actor capabilities. The post The Intersection of AI and OSINT: Advanced Threats On The Horizon appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Top Cyber Asset Attack Surface Management (CAASM) Tools for 2024

In today’s dynamic cybersecurity landscape, organizations face an ever-evolving threat environment where new vulnerabilities are continuously discovered, and attack surfaces expand with the increasing digitalization of business processes. This is where (CAASM) Cyber Asset Attack Surface Management tools come into…

The Worst Hacks of 2024

From Chinese cyberspies breaching US telecoms to ruthless ransomware gangs disrupting health care for millions of people, 2024 saw some of the worst hacks, breaches, and data leaks ever. This article has been indexed from Security Latest Read the original…

PlugX worm disinfection campaign feedbacks

In September 2023, we successfully took ownership of one of the IP addresses used by the PlugX worm—a variant of PlugX associated with Mustang Panda, which possesses worming capabilities by infecting flash drives. Following this success, we studied the inner…

Beware of New Malicious PyPI packages That Steals Login Details

Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet’s AI-driven OSS malware detection system. These packages, spotted on November 16 and November 24, 2024, respectively, represent significant threats to users by leveraging advanced malware techniques. These findings…

Researchers Uncovered Dark Web Operation Acquiring KYC Details

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves the systematic collection and exploitation of genuine identity documents and images.  Attackers utilize these resources to develop and sell techniques for bypassing identity verification systems,…