Category: EN

The Mask APT is back after 10 years of silence

Kaspersky researchers linked a new wave of cyber attacks to the cyber espionage group tracked as The Mask. Kaspersky researchers linked several targeted attacks to a cyber espionage group known as The Mask. The APT group targeted an organization in…

Hacker Leaks Cisco Data

IntelBroker has leaked 2.9 Gb of data stolen recently from a Cisco DevHub instance, but claims it’s only a fraction of the total.  The post Hacker Leaks Cisco Data appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

European Commission Opens TikTok Election Integrity Probe

The European Commission is investigating whether TikTok allowed foreign actors to influence voters during recent Romanian elections This article has been indexed from www.infosecurity-magazine.com Read the original article: European Commission Opens TikTok Election Integrity Probe

GitGuardian launches multi-vault integration to combat secrets sprawl

GitGuardian unveiled a comprehensive Non-Human Identity (NHI) security strategy with integrations across major secrets management platforms, addressing the growing challenge of secrets sprawl in enterprise environments. With Non-Human Identities—digital references used to authenticate machine-to-machine access—now outnumbering human users 100:1, organizations…

Stairwell Core boosts threat intelligence for security teams

Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently determine if malware has affected their systems. Core offers customers an accessible entry point into the Stairwell ecosystem, giving users…

CISA cloud directive, Texas Tech breach, Meta GDPR fine

CISA delivers new directive for securing cloud environments Texas Tech reports a data breach affecting 1.4 million people Meta fined $263 million for alleged GDPR violations Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep…

Multiple SHARP Routers Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been identified in SHARP routers, potentially allowing attackers to execute arbitrary code with root privileges or compromise sensitive data. Labeled under JVN#61635834, the vulnerabilities highlight significant security concerns for affected devices. Overview and Key Vulnerabilities JPCERT/CC, alongside…

CrowdStrike Allies With Salt Security to Improve API Security

CrowdStrike and Salt Security have extended their alliance to make it simpler to feed application programming interface (API) security data directly into a security information event management (SIEM) platform. The post CrowdStrike Allies With Salt Security to Improve API Security…

How to Prevent Cyber Threats in the Chemical Sector

The chemical sector plays a crucial role in the global economy, providing essential materials for industries ranging from pharmaceuticals to agriculture. However, as technology advances, so do the risks associated with digital systems. Cyber threats, such as ransomware, data breach-es,…

Ransomware attacks on Texas University and Namibia Telecom

Interlock Ransomware Targets Texas Tech University Health Sciences Center A relatively unknown ransomware group, Interlock, has reportedly targeted the Texas Tech University Health Sciences Center, posing a significant threat to the personal data of over 1.46 million patients. The gang…