Category: EN

Hacked Mandiant X Account Abused for Cryptocurrency Theft

Mandiant’s account on X, formerly Twitter, was hacked and used to lure users to a cryptocurrency phishing site. The post Hacked Mandiant X Account Abused for Cryptocurrency Theft appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

Over 1800 global banking apps targeted by 29 malware variants

In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based on a comprehensive survey conducted by security firm Zimperium, involved insights from over 2000 respondents spanning 61 countries. Outlined in…

Experts Clash Over Ransomware Payment Ban

Emsisoft has called for a complete ban on ransomware payments after another record-breaking year of attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: Experts Clash Over Ransomware Payment Ban

Three Chinese balloons float near Taiwanese airbase

Also: Remember that balloon over the US last February? It might have used a US internet provider Four Chinese balloons have reportedly floated over the Taiwan Strait, three of them crossing over the island’s land mass and near its Ching-Chuan-Kang…

SentinelOne acquires PingSafe to expand cloud security capabilities

SentinelOne has agreed to acquire PingSafe. The acquisition of PingSafe’s cloud native application protection platform (CNAPP), when combined with SentinelOne’s cloud workload security and cloud data security capabilities, is expected to provide companies with a fully integrated platform that drives…

OpenSSL 3.1 FIPS Module Has Been Submitted for Validation

On 2023-12-29 we have submitted our FIPS 140-3 validation report to NIST’s Cryptographic Module Validation Program (CMVP). This in no way impacts our existing FIPS 140-2 certificate which remains valid and will be maintained until its sunset date in September…

Securing Gold: Assessing Cyber Threats on Paris 2024

Based on these observations and given the constantly evolving cyber threat landscape, we analysed cyber threats affecting previous editions of the Olympics, as well as the current geopolitical context to understand potential motivations of malicious actors to target this event,…