Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also involves the deployment of Cobalt Strike and the ConnectWise ScreenConnect remote desktop software. “SSLoad is designed to stealthily infiltrate systems, gather sensitive…
Tag: EN
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC) from at least 2016…
US Sanctions Iranian “Fronts” for Cyber-Attacks on American Entities
The US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government This article has been indexed from www.infosecurity-magazine.com Read the original article: US Sanctions Iranian “Fronts” for Cyber-Attacks on American…
Multiple Vulnerabilities Found In Forminator WordPress Plugin
WordPress admins using the Forminator plugin on their websites must rush to update their sites… Multiple Vulnerabilities Found In Forminator WordPress Plugin on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been…
Spyroid RAT Attacking Android Users to Steal Confidential Data
A new type of Remote Access Trojan (RAT) named Spyroid has been identified. This malicious software is specifically designed to infiltrate Android systems, stealing confidential data and compromising user privacy. What is Spyroid RAT? Spyroid RAT is a sophisticated malware…
Check Point Named Strategic Leader in AV-Comparatives EPR Report
Check Point Harmony Endpoint has been recognized as a Strategic Leader in AV-Comparatives’ 2023 Endpoint Prevention and Response (EPR) report. This accolade underscores Harmony Endpoint’s exceptional capabilities in proactively defending against advanced cyber threats. The AV-Comparatives EPR report is a…
Hackers Publish Fake Story About Ukrainians Attempting To Assassinate Slovak President
An unidentified attacker hacked a Czech news service’s website and published a fake story on Tuesday claiming that an assassination attempt had been made against the newly elected Slovak president Petr Pellegrini. This article has been indexed from Cyware News…
Threat Actor Uses Multiple Infostealers in Global Campaign
A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide. The post Threat Actor Uses Multiple Infostealers in Global Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed…
CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
CISA warns organizations of a two-year-old Windows Print Spooler vulnerability being exploited in the wild. The post CISA Warns of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Nagomi Security Emerges From Stealth With $30 Million in Funding
Nagomi Security, a company that helps customers prevent threats by leveraging existing security tools, emerged from stealth with $30 million in funding. The post Nagomi Security Emerges From Stealth With $30 Million in Funding appeared first on SecurityWeek. This article…
Amplifier Security Emerges From Stealth With AI Copilot, Human-in-the-Loop Automation
Amplifier Security has raised $3.3 million in funding for a solution that includes human-in-the-loop automation and an AI copilot. The post Amplifier Security Emerges From Stealth With AI Copilot, Human-in-the-Loop Automation appeared first on SecurityWeek. This article has been indexed…
Google Patches Critical Chrome Vulnerability
Google patches CVE-2024-4058, a critical Chrome vulnerability for which researchers earned a $16,000 reward. The post Google Patches Critical Chrome Vulnerability appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article: Google Patches…
Nigeria, Romania, Russia, U.S. Among Top Cybercrime Nations
Russia and Ukraine topped a list of cybercrime-producing nations, followed by China and the United States, with African nation Nigeria rounding out the top five. The post Nigeria, Romania, Russia, U.S. Among Top Cybercrime Nations appeared first on Security Boulevard.…
Zero Networks unveils identity segmentation solution to prevent credential theft
Zero Networks announced the addition of identity segmentation capabilities within the Zero Networks platform. As stolen credentials remain a top threat facing organizations, this new identity segmentation solution stops privileged account abuse by automatically restricting access to operational needs only.…
Capture the CISO S2E2: HYAS, Nudge Security, and SlashNext
Welcome to episode one of Capture the CISO Season 2! Our judges are Arvin Bansal, CISO, C&S Wholesale Grocers and Brett Conlon, CISO, American Century Investments. Our contestants: And don’t forget to join […] The post Capture the CISO S2E2: HYAS, Nudge Security, and…
Dexalot Announces Launch of Its Central Limit Order Book DEX on Arbitrum
By Owais Sultan Central limit order book (CLOB) decentralized exchange Dexalot has announced it is launching on Arbitrum. The move marks… This is a post from HackRead.com Read the original post: Dexalot Announces Launch of Its Central Limit Order Book…
KnowBe4 acquires UK’s Egress to create advanced AI-driven platform to manage human risk
KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced it has entered into a definitive agreement to acquire Egress, a leader in adaptive and integrated cloud email security. Egress’ Intelligent Email Security suite…
Report: Fifth of UK Companies Admit Staff Leaked Data via GenAI
One in five UK companies has experienced sensitive corporate data exposure due to employees’ use of generative AI (GenAI), according to a report by cybersecurity services provider RiverSafe. This article has been indexed from Cyware News – Latest Cyber News…
Cybersecurity Trends and Predictions for 2024
By Nick France, CTO at Cybersecurity Leader Sectigo Given the fact that bad actors are always on the prowl, 2024 is off to a fast start with numerous cybersecurity incidents […] The post Cybersecurity Trends and Predictions for 2024 appeared…
Tines taps $50M to expand its workflow automation beyond security teams
Automation continues to be a major theme in the enterprise — underscored not least by the rise of AI as a tool to help fix some of the more routine, resource-intensive and fragmented aspects of how security and other IT…