Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

20/10/2024 0 Comments 0 tags

Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as part of a phishing attack designed to steal user credentials.

Acronym Overdose – Navigating the Complex Data Security Landscape

19/10/2024 0 Comments 0 tags

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

19/10/2024 0 Comments 0 tags

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

18/10/2024 0 Comments 0 tags

Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems. “This tactic involves displaying

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

18/10/2024 0 Comments 0 tags

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks. “Since

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

18/10/2024 0 Comments 0 tags

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

18/10/2024 0 Comments 0 tags

North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

18/10/2024 0 Comments 0 tags

Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency, Consent, and Control (TCC) framework in macOS that has likely come under exploitation to get around a user’s

Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

17/10/2024 0 Comments 0 tags

Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group’s affiliate panel on the dark web. Singapore-headquartered Group-IB said it

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

17/10/2024 0 Comments 0 tags

The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late