Category: EN

Nation-state APTs ramp up attacks on Ukraine and the EU

Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named…

Third-party cyber risks and what you can do

When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of…

ESET APT Activity Report Q4 2024–Q1 2025

An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q4 2024 and Q1 2025 This article has been indexed from WeLiveSecurity Read the original article: ESET APT Activity Report Q4 2024–Q1 2025

‘Ongoing’ Ivanti hijack bug exploitation reaches clouds

Nothing like insecure code in security suites The “ongoing exploitation” of two Ivanti bugs has now extended beyond on-premises environments and hit customers’ cloud instances, according to security shop Wiz.… This article has been indexed from The Register – Security…

Keeper Security appoints new CISO

Keeper Security, the cybersecurity provider of zero-trust and zero-knowledge Privileged Access Management (PAM) software protecting passwords, passkeys, privileged accounts, secrets and remote connections, is pleased to announce that security industry veteran Shane Barney has been appointed Chief Information Security Officer…

KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…

Fitting Cybersecurity Investments into Your Budget

How Can You Make Cybersecurity Budget Allocations Effective? How do organizations allocate effective funds to cybersecurity? The million-dollar question remains unanswered for many businesses, irrespective of their sizes. It’s not just a matter of investment in security, but also strategizing…

Free to Choose the Right Security for Your Cloud

Is Choosing Cloud Security a Complex Task? From financial services and healthcare to DevOps and SOC teams, businesses across sectors are grappling with the complexity of managing Non-Human Identities (NHIs). NHIs, essentially machine identities, are a critical component of an…

Securing iCloud Accounts – Best Practices for iPhone Users

As iPhones become the central hub for personal and professional life, Apple’s iCloud service has grown indispensable for millions of users. iCloud seamlessly syncs photos, contacts, documents, and backups across devices, but this convenience also makes it a prime target…