Tag: EN

Drupal Releases Security Advisory for Drupal Core

Drupal released a security advisory to address a vulnerability affecting multiple Drupal core versions. A cyber threat actor could exploit this vulnerability to cause a denial-of-service condition. CISA encourages users and administrators to review Drupal security advisory SA-CORE-2024-001 for more information and…

Google TAG warns that Russian COLDRIVER APT is using a custom backdoor

Google warns that the Russia-linked threat actor COLDRIVER expands its targeting and is developing a custom malware. The ColdRiver APT (aka “Seaborgium“, “Callisto”, “Star Blizzard”, “TA446”) is a Russian cyberespionage group that has been targeting government officials, military personnel, journalists and…

Are You Ready for PCI DSS 4.0?

The Payment Card Industry Data Security Standard (PCI DSS) is the global benchmark for ensuring companies that handle credit card information maintain a secure environment. It provides a framework to help organizations protect sensitive cardholder data from theft and secure…

SOC-as-a-Service: The Five Must-Have Features

SOCs are one of the most important functions of an organization’s security defenses, but they are also a heavy drain on resources. The post SOC-as-a-Service: The Five Must-Have Features appeared first on Security Boulevard. This article has been indexed from…

Google says Russian espionage crew behind new malware campaign

Google researchers say they have evidence that a notorious Russian-linked hacking group — tracked as “Cold River” — is evolving its tactics beyond phishing to target victims with data-stealing malware. Cold River, also known as “Callisto Group” and “Star Blizzard,”…

Illicit Cryptocurrency Flows Drop 39% in 2023

Chainalysis data shows major drop in value of funds received into underground crypto addresses in 2023, to $24.2bn This article has been indexed from www.infosecurity-magazine.com Read the original article: Illicit Cryptocurrency Flows Drop 39% in 2023

What is the Windows Security Account Manager (SAM)?

To most people, the process of logging into a Microsoft Windows machine is a simple process of entering a username and a password. However, for a cybersecurity professional, the process is a carefully orchestrated mechanism. Unfortunately, throughout the history of…