In the world of cybersecurity, new threats emerge constantly, and it’s vital for organizations to stay vigilant. Recently, a critical vulnerability, known as CVE-2023-46604, has been making headlines due to its exploitation by the Hello Kitty ransomware group. In this…
Tag: EN
TuxCare Announces Early Access to CentOS 7 Extended Lifecycle Support
PALO ALTO, Calif. – November 15, 2023 – TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced it’s now offering early access to its CentOS 7 Extended Lifecycle Support (ELS) repository. Organizations can now gain missing patches to…
Resecurity enhances cybersecurity in the Middle East
In a significant stride towards fortifying the cybersecurity landscape in the Middle East, Resecurity introduced its Digital Identity Protection (IDP) solution. This strategic move aligns with Resecurity’s commitment to creating a safer digital society and empowering individuals and businesses in…
SystemBC, a SWISS KNIFE Proxy Malware, Used by Numerous Ransomware Groups
SystemBC (aka Coroxy or DroxiDat) is a multifunctional malware known as Proxy, Bot, Backdoor, and RAT, adapting to attackers’ needs. Since 2018, this multifunctional malware has been active, and it remains popular in underground markets, with consistent annual incidents. Cybersecurity…
State-Backed Hackers a Threat to Australia, Agency Warns
The AUKUS partnership, with its focus on nuclear submarines and other advanced military capabilities, is likely a target for state actors looking to steal intellectual property. The post State-Backed Hackers a Threat to Australia, Agency Warns appeared first on SecurityWeek.…
Radiant Security raises $15 million to expand engineering and go-to-market capacity
Radiant Security announced the successful closure of a $15 million Series A funding round. This strategic financing, led by Next47, reaffirms the soaring demand for AI-based solutions that address the longstanding challenges faced by Security Operations Centers (SOCs). In addition…
Three Ways Varonis Helps You Fight Insider Threats
What do basketball teams, government agencies, and car manufacturers have in common? Each one has been breached, having confidential, proprietary, or private information stolen and exposed by insiders. In each case, the motivations and methods varied, but the risk remained…
Future-Proofing Retail: Rethinking Cybersecurity for the Digital Shopping Era
The holiday shopping season is upon us again, and retailers are gearing up for the highly anticipated sales events of Black Friday and Cyber Monday. While these days represent peak consumer spending, the prominence of digital channels also introduces complex…
Gamblers’ data compromised after casino giant Strendus fails to set password
Mexican online casino Strendus has exposed sensitive user data, including home addresses and the amounts of money they spent on gambling. Strendus, one of the biggest online casinos in Mexico has exposed sensitive user data, including home addresses and the…
New Intel CPU Vulnerability ‘Reptar’ Can Allow DoS Attacks, Privilege Escalation
A new Intel CPU vulnerability tracked as Reptar and CVE-2023-23583 can be exploited for DoS attacks and possibly privilege escalation. The post New Intel CPU Vulnerability ‘Reptar’ Can Allow DoS Attacks, Privilege Escalation appeared first on SecurityWeek. This article has…
Chipmaker Patch Tuesday: Intel, AMD Address Over 130 Vulnerabilities
Intel and AMD have informed their customers about a total of more than 130 vulnerabilities found in their products. The post Chipmaker Patch Tuesday: Intel, AMD Address Over 130 Vulnerabilities appeared first on SecurityWeek. This article has been indexed from…
UK Privacy Regulator Issues Black Friday Smart Device Warning
Consumers urged to think before they buy connected technology This article has been indexed from www.infosecurity-magazine.com Read the original article: UK Privacy Regulator Issues Black Friday Smart Device Warning
Financial Institutions in New York Face Stricter Cybersecurity Rules
Boards of directors need to maintain an appropriate level of cyber expertise, incidents must be reported within 72 hours after determination, and all ransom payments made must be reported within a day. Those are just some of the changes made…
Secure Access Control in 2024: 6 Trends to Watch Out For
What Is Secure Access Control? Secure access control, part of the broader field of user management , is a key concept in the realm of information security, particularly in the business environment. It refers to the process of selectively restricting…
Ransomware more efficient than ever, and baddies are still after your logs
Trying times for incident responders who battle fastest-ever ransomware blitz as attackers keep scrubbing evidence clean Organizations are still failing to implement adequate logging measures, increasing the difficulty faced by defenders and incident responders to identify the cause of infosec…
Microsoft Fixes Five Zero-Day Vulnerabilities
Patch Tuesday includes fixes for three actively exploited bugs This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Five Zero-Day Vulnerabilities
Acuity – 14,055,729 breached accounts
In mid-2020, a 437GB corpus of data attributed to an entity named "Acuity" was created and later extensively distributed. However, the source could not be confidently verified as any known companies named Acuity. The data totalled over 14M unique email…
US Dismantles IPStorm Botnet Proxy Service
Russian-Moldovan national faces maximum 30-year jail stretch This article has been indexed from www.infosecurity-magazine.com Read the original article: US Dismantles IPStorm Botnet Proxy Service
VMware disclosed a critical and unpatched authentication bypass flaw in VMware Cloud Director Appliance
VMware disclosed a critical bypass vulnerability in VMware Cloud Director Appliance that can be exploited to bypass login restrictions when authenticating on certain ports. VMware disclosed an authentication bypass vulnerability, tracked as CVE-2023-34060 (CVSS score 9.8), in its Cloud Director Appliance…
CVE-2023-4966 vulnerability becomes a global problem
Threat researcher Kevin Beaumont has been tracking attacks against various companies, including the Industrial and Commercial Bank of China (ICBC), DP World, Allen & Overy, and Boeing, and found they had something […] Thank you for being a Ghacks reader.…