Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Veeam plugs serious holes in Service Provider Console (CVE-2024-42448, CVE-2024-42449) Veeam has fixed two vulnerabilities in Veeam Service Provider Console (VSPC), one of which (CVE-2024-42448)…
Tag: EN
Andromeda Malware Resurfaces: Targeting APAC Manufacturing and Logistics Industries
In a fresh revelation by the Cybereason Security Services Team, a new wave of attacks linked to the notorious Andromeda malware has been uncovered, focusing on manufacturing and logistics sectors in the Asia-Pacific (APAC) region. This decades-old malware, first detected…
Mastering PAM to Guard Against Insider Threats
Why is Privileged Access Management (PAM) a Game-Changer in Cybersecurity? Have you ever wondered how to shore up your organization’s cybersecurity, minimize insider threats, and increase efficiency? The answer lies in mastering the art of Privileged Access Management or PAM.…
Enhancing Data Security with Advanced Secrets Rotation
How can Secrets Rotation Enhance Data Security? Most of us are well aware of the essential role that cybersecurity plays in safeguarding our sensitive information. But have you ever pondered about the importance of Non-Human Identity (NHI) management and secrets…
Best Practices for Machine Identity Management
Why is Machine Identity Management Crucial? In the ever-evolving field of cybersecurity, one critical element often overlooked is machine identity management. Even though humans interact with machines daily, the importance of securing machine identities — often referred to as Non-Human…
8Base ransomware group hacked Croatia’s Port of Rijeka
The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and accounting info. A cyber attack hit the Port of Rijeka in Croatia, the 8Base ransomware group claimed responsibility for the security breach. The Port of…
Romania’s Election System Hit by Over 85,000 Cyberattacks, Russian Links Suspected
Romania’s intelligence service in its declassified report disclosed the country’s election systems were hit by over 85,000 cyberattacks. Attackers have also stolen login credentials for election-related sites and posted the information on a Russian hacker forum just before the first…
84 Arrested as Russian Ransomware Laundering Networks Disrupted
Operation Destabilise was a major international operation led by the UK’s National Crime Agency (NCA) to dismantle two Russian-speaking criminal networks: Smart and TGR. These networks were backbone in laundering billions of dollars for various criminal activities. This article has…
Are You Using AI in Marketing? Here’s How to Do It Responsibly
Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries and delivering unprecedented value to businesses worldwide. From automating mundane tasks to offering predictive insights, AI has catalyzed innovation on a massive scale. However, its rapid adoption raises…
Iran Spies on Senior Israeli Officials, Launches Over 200 Cyberattacks
Shin Bet, an Israeli Cybersecurity Service said recently it discovered over 200 Iranian phishing attempts targeting top Israeli diplomats to get personal information. Shin Bet believes the attacks were launched by Iranian actors through Telegram, WhatsApp, and email. The threat…
Generative AI Fuels Financial Fraud
< p style=”text-align: justify;”>According to the FBI, criminals are increasingly using generative artificial intelligence (AI) to make their fraudulent schemes more convincing. This technology enables fraudsters to produce large amounts of realistic content with minimal time and effort, increasing…
ENISA’s Biennial Cybersecurity Report Highlights EU Threats and Policy Needs
< p style=”text-align: justify;”>The EU Agency for Cybersecurity (ENISA) has released its inaugural biennial report under the NIS 2 Directive, offering an analysis of cybersecurity maturity and capabilities across the EU. Developed in collaboration with all 27 EU Member…
Turn Your Phone Off Daily for Five Minutes to Prevent Hacking
< p style=”text-align: justify;”>There are numerous ways in which critical data on your phone can be compromised. These range from subscription-based apps that covertly transmit private user data to social media platforms like Facebook, to fraudulent accounts that trick…
Cybersecurity Leader SonicWall Shares 2025 Outlook
Cybersecurity leader SonicWall has just released their 2025 outlook, including the threats, challenges and trends that will shape the sector in the year ahead. Below, SonicWall’s leading team of threat researchers share their forecast including the key vulnerabilities and threats…
New DroidBot Android Spyware Targeting Banking and Crypto Users
DroidBot, a sophisticated Android RAT, is targeting individuals and financial institutions across Europe. This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: New DroidBot Android Spyware Targeting Banking and Crypto…
Safeguarding resilience in the age of outages: Essential actions for CIOs
With technology now supporting almost every facet of business operations, the durability of IT systems and networks is increasingly crucial. Recent events like the CrowdStrike service disruption demonstrate that even top-tier organisations can be susceptible to having their systems impacted…
Lest We Forget: United States National Pearl Harbor Remembrance Day, In Memoriam: The 2,403
<img alt=”” height=”800″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/4f8a3d3c-4e1d-4cc5-8a08-dcb9b2d20057/pearl%2Bharbor%2Bnational%2Bremembrance%2Bday.jpeg?format=1000w” width=”800″ /> On August 23, 1994, the United States Congress, by Public Law 103–308, 108 Statute 1169, designated December 7th of each year as National Pearl Harbor Remembrance Day. On November 29th, President Bill Clinton issued…
US Officials Recommend Encryption Apps Amid Chinese Telecom Hacking
Plus: Russian spies keep hijacking other hackers’ infrastructure, Hydra dark web market admin gets life sentence in Russia, and more of the week’s top security news. This article has been indexed from Security Latest Read the original article: US Officials…
NAKIVO Launches v11 with Advanced Security Features for Virtualized Environments and Microsoft 365
NAKIVO, a reputable vendor in data protection and disaster recovery, proudly announces the release of NAKIVO Backup & Replication v11. This new version introduces advanced functionalities tailored to meet the evolving needs of businesses in ensuring security for virtualized environments.…
DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory
Security researchers have identified a significant vulnerability dubbed “DaMAgeCard Attack” in the new SD Express card standard that could allow attackers to directly access system memory through Direct Memory Access (DMA) attacks. The vulnerability stems from SD Express cards’ use…