Head Mare, a Russian-focused hacktivist group, gained notoriety in 2023 by targeting organizations in Russia and Belarus as they employ phishing tactics to distribute WinRAR archives exploiting the CVE-2023-38831 vulnerability, gaining initial access to victims’ systems. Once inside, they steal…
Category: EN
10 Topics Every Cybersecurity Awareness Training Program Should Cover
While the cybersecurity team plays a critical role in the fight against data breaches, a company’s employees are often the first line of defense (or failure). The numbers back this up: IBM’s 2024 data breach report shows cybersecurity employee training…
The 6 Best Antivirus Software Options for Windows in 2024
Bitdefender GravityZone is best overall when it comes to our top choices for protection from malware like viruses, spyware, trojans, and bots. This article has been indexed from Security | TechRepublic Read the original article: The 6 Best Antivirus Software…
VIVOTEK RealSight Engine improves images clarity in various scenarios
VIVOTEK has announced an upgrade to its comprehensive AI security solution with the release of the new AI feature, RealSight Engine. This feature transforms images captured by network cameras into clear, visible facial images under any lighting conditions. Even in…
Red Flag? My Vendor Just Asked for My Mother’s Maiden Name
Just because a vendor is selling a security solution doesn’t mean they should expect your trust right away. Too many vendors initiate relationships with requests that stink of phishing emails. […] The post Red Flag? My Vendor Just Asked for…
Beware Of New Phishing Attack That Mimics ScreenConnect And Zoom
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most. Cyble Research & Intelligence Labs (CRIL) has uncovered a sophisticated phishing operation targeting Zoom users. The scheme utilizes a fraudulent…
Chrome Vulnerability Let Attackers Execute Arbitrary Code Remotely
The stable channel for desktops has been updated to version 128.0.6613.119/.120 for Windows and Mac, and 128.0.6613.119 for Linux. This update will be gradually rolled out over the coming days and weeks. For those using the Extended Stable channel, version…
Researchers Detailed Russian Hacktivist/State Hackers Tactics
The People’s Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and other disruptive tactics. Operating as part of the broader Russian cyber warfare landscape, the group has been involved in several…
Ransomhub Attacked 210 Victims Since Feb 2024, CISA Released Advisory For Defenders
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). RansomHub, a ransomware-as-a-service variant, has been active since February 2024, targeting various critical infrastructure sectors,…
The six most dangerous new threats security teams need to know about
The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks. As the technology evolves, many organisations prioritise AI innovation at…
INSIDER THREAT AWARENESS MONTH: Are you prepared?
An insider threat can feel a bit like the plot twist in a spy thriller. You know, the moment when the protagonist realises the enemy is not just at the gates but has been inside the house the whole time.…
Transport for London confirms cyberattack, assures us all is well
Government body claims there is no evidence of customer data being compromised Transport for London (TfL) – responsible for much of the public network carrying people around England’s capital – is battling to stay on top of an unfolding “cyber…
Qilin Ransomware Attack Used To Steal Chrome Browser Data
In the cyberthreat landscape, Qilin ransomware attack has recently been observed stealing credentials in Chrome browsers. Reports claim that these credentials are being acquired using a small set of compromised end points. In this article, we’ll cover how the attack…
TuxCare Completes FIPS 140-3 Certification for AlmaLinux 9.2 Kernel
PALO ALTO, Calif. – September 3, 2024 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it received a CMVP–validated certificate for the AlmaLinux 9.2 kernel and is now on the NIST Active list. TuxCare’s Extended…
Ubuntu Patches Multiple Vim Vulnerabilities
Recently, Canonical has released security updates to address multiple Vim vulnerabilities in Ubuntu 14.04 ESM. Ubuntu 14.04, codenamed “Trusty Tahr,” reached its end-of-life (EOL) on April 30, 2019. After this date, Canonical stopped providing official updates, including security patches, for…
Transport for London is dealing with a cyber security incident
Transport for London (TfL) has sent out notifications to customers on Sunday evening saying that they “are currently dealing with an ongoing cyber security incident.” The government body that manages most of the transport network of United Kingdom’s capital did…
Cybersecurity News: London transport cyberattack, German ATC attack, Sweden’s heightened risk
In today’s cybersecurity news… Transport for London suffers cyberattack The local government body responsible for most of the transport system in Greater London is currently dealing with a cyberattack, but […] The post Cybersecurity News: London transport cyberattack, German ATC…
Starlink Refuses To Block X In Brazil
SpaceX’s Starlink tells Brazil telecoms regulator it will not block X until bank accounts are unfrozen, amidst legal row This article has been indexed from Silicon UK Read the original article: Starlink Refuses To Block X In Brazil
Iranian Hackers Using Multi-Stage Malware To Attack Govt And Defense Sectors Via LinkedIn
Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler. This backdoor has been used to target various sectors, including satellite, communications equipment, oil and gas, and government, in the United States…
Operation Oxidovy, Threat Actors Targeting Government And Military Officials
The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a batch script. The LNK runs the batch script, which spawns a decoy PDF document and renames a masqueraded PDF file…