Blog Series
Cybersecurity News
- No categories
CISA, FBI, issues advisory on...
As part of the #StopRansomware campaign, the U.S. and Australian governments, as well as the Cybersecurity and Infrastructure Security Agency (CISA), the FBI and Australian Cyber Security Centre (ACSC) have...
Teltonika networks’ IIoT products vulnerable...
Claroty and Otorio have discovered severe flaws in Teltonika Networks’ Industrial Internet of Things (IIoT) devices, posing a substantial danger to operational technology (OT) networks. The investigation uncovered eight flaws...
Critical vulnerability in KeePass exposes...
A researcher known as “vdohney” discovered a critical vulnerability (CVE-2023-32784) in the open-source password manager KeePass. This vulnerability allows hostile actors to get the master password stored in the software’s...
SentinelOne warns of increase in...
SentinelOne has issued a warning regarding an increase in the number of new ransomware families created exclusively for VMware ESXi systems. These dangerous apps are based on the circulating Babuk...
Capterra reveals rise in software...
According to a recent Capterra survey, an alarming 61% of U.S. organizations have suffered significant repercussions as a result of software supply chain vulnerabilities in the last year, underlining the...
Deep instinct reveals new Linux...
Deep Instinct has discovered the existence of BPFDoor, a previously unreported and exceedingly elusive variation of a Linux backdoor. This backdoor has garnered popularity due to its outstanding stealth qualities,...
Bad bot traffic hits record...
According to Imperva’s 10th annual Bad Bot Report, bad bot traffic has dominated the internet, hitting a new high of 47.4% of all online activity, while human-generated traffic has declined...
Lazarus’ “Operation DreamJob” campaign targets...
ESET has discovered a new Lazarus campaign as part of “Operation DreamJob,” marking the first instance of malware targeting Linux users and verifying Lazarus’ participation in the recent supply-chain assault...
Strategies for effective patch management...
Core technologies including encryption, password management, and two-factor authentication are being evaluated as threat actor protection tactics, however, patch management should not be forgotten in the drive to safeguard organizations...
Malicious actors exploits generative AI...
In a threat alert, Meta revealed that malicious actors are taking advantage of the rising popularity of generative artificial intelligence (AI), particularly ChatGPT, to carry out their nefarious activities. It...
Russian indicted for operating stolen...
Denis Gennadievich Kulkov, a Russian national suspected of masterminding a profitable stolen credit card checking enterprise worth tens of millions of dollars, has been indicted by the United States Department...
Android subscription malware ‘Fleckpe’ found...
Kaspersky Lab has discovered a new Android subscription virus known as ‘Fleckpe’ on Google Play, the main software store for Android smartphones. This virus, disguised as legal programs, has amassed...