Category: EN

Arm zero-day in Mali GPU Drivers actively exploited in the wild

Semiconductor and software design company Arm warns of an actively exploited zero-day vulnerability in Mali GPU Kernel Driver. Arm is warning of an actively exploited zero-day vulnerability, tracked as CVE-2024-4610, in Mali GPU Kernel Driver. The vulnerability is a use-after-free issue issue…

Diligent AI enables leaders to better manage and respond to risk

Diligent announced Diligent AI, a set of artificial intelligence capabilities within the Diligent One Platform that enhance how organizations understand, anticipate and mitigate risks. Diligent AI will enable users to identify risks, safeguard data and democratize the decision-making processes, driving…

Applied Human Threat Management in Cyber Industry

By Milica D. Djekic The high-tech industry is an extremely emerging environment dealing with the sophisticated and skilled workforce that is recruited to develop an ultimate cutting-edge technology, so far. […] The post Applied Human Threat Management in Cyber Industry…

BlackBerry Cylance Data Offered for Sale on Dark Web

BlackBerry says the Cylance data offered for sale for $750,000 is old and its own systems have not been compromised.  The post BlackBerry Cylance Data Offered for Sale on Dark Web appeared first on SecurityWeek. This article has been indexed…

Remcos RAT Distributed As UUEncoding (UUE) File To Steal Logins

Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate business communication, such as import/export or quotations.  The emails contain a UUEncoded (UUE) file compressed with Power Archiver, which likely…

Strategies to Manage and Reduce Alert Fatigue in SOCs

The cybersecurity sector is stretched thinner than ever. Budgets are low, attack rates are high, and staff are stressed. A study from 2022 found that one-third of cybersecurity professionals said they were considering leaving their role in the next two…

Top 10 Critical Pentest Findings 2024: What You Need to Know

One of the most effective ways for information technology (IT) professionals to uncover a company’s weaknesses before the bad guys do is penetration testing. By simulating real-world cyberattacks, penetration testing, sometimes called pentests, provides invaluable insights into an organization’s security…

Chinese Hackers using New Noodle RAT to Attack Linux Servers

Cybersecurity experts have identified a new type of malware called “Noodle RAT,” which Chinese-speaking hacker groups use to target Linux servers. Although this malware has been active since 2016, it has only recently been properly classified, shedding light on its…

When things go wrong: A digital sharing warning for couples

Digital sharing is the norm in romantic relationships. But some access could leave partners vulnerable to inconvenience, spying, and abuse. This article has been indexed from Malwarebytes Read the original article: When things go wrong: A digital sharing warning for…