Tag: EN

US CERT Alert AA24-242A (RansomHub Ransomware)

RansomHub is a ransomware-as-a-service variant—formerly known as Cyclops and Knight—that has established itself as an efficient and successful service model. The post US CERT Alert AA24-242A (RansomHub Ransomware) appeared first on SafeBreach. The post US CERT Alert AA24-242A (RansomHub Ransomware)…

Randall Munroe’s XKCD ‘Stranded’

<a class=” sqs-block-image-link ” href=”https://xkcd.com/2978/” rel=”noopener” target=”_blank”> <img alt=”” height=”323″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/241c900a-73ba-4bdb-8b8c-e43be64814db/stranded.png?format=1000w” width=”219″ /> </a><figcaption class=”image-caption-wrapper”> via the comic & dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Stranded’ appeared first on Security Boulevard. This…

Chinese Hackers Exploit Serious Flaw in Versa SD-WAN Systems

  A Chinese cyber-espionage group, known as Volt Typhoon, has been exploiting a newly discovered security flaw in Versa Networks’ SD-WAN Director servers. This zero-day vulnerability, identified as CVE-2024-39717, has already been used to infiltrate several organizations. Given the seriousness…

Bling Libra Shifts Focus to Extortion in Cloud-Based Attacks

  It was observed during an incident response engagement handled by Unit 42, that the threat actor group Bling Libra (which was responsible for distributing ShinyHunters ransomware) had shifted from extortion to extortion of victims rather than its traditional tactic…

Making Progress and Losing Ground

As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many people are now aware of… The post Making Progress and Losing Ground appeared first on…

Seven Deadly Myths of DDoS Protection

Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people or about natural events and facts; 2. a commonly believed but false idea.  Myths in their purest form have been…

Durex data breach leaks sensitive details of customers

Durex India, a prominent sexual wellness brand known for its condoms and intimate products, has recently suffered a cyber attack that compromised sensitive customer information. The breach has led to the exposure of personal data including full names, contact numbers,…

Simplify identity management with Red Hat IdM

Red Hat Identity Management (IdM) is a centralized and comprehensive identity management solution that provides a wide range of features designed to help manage user identities, enforce security policies and facilitate access management. IdM offers a number of tailored and…

Use cases and ecosystem for OpenShift confidential containers

Red Hat OpenShift sandboxed containers, built on Kata Containers, provide the additional capability to run confidential containers (CoCo). This article continues our previous one, Exploring the OpenShift confidential containers solution and looks at different CoCo use cases and the ecosystem…