Why Hardsec Matters: From Protecting Critical Services to Enhancing Resilience

13/08/2024 0 Comments 0 tags

Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing attacks by detecting them and responding. However, as cyber threats become more sophisticated. There

Ukraine Warns of New Phishing Campaign Targeting Government Computers

13/08/2024 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security Service of Ukraine to distribute malware capable of remote desktop

FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

13/08/2024 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor (aka Radar). The effort saw the dismantling

How Phishing Attacks Adapt Quickly to Capitalize on Current Events

12/08/2024 0 Comments 0 tags

In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year, according to research from Egress. What’s behind

FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

12/08/2024 0 Comments 0 tags

The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges.

The AI Hangover is Here – The End of the Beginning

12/08/2024 0 Comments 0 tags

After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the market corrects the share price of the major players (like

Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

12/08/2024 0 Comments 0 tags

Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and Deye that could enable malicious actors to cause disruption and

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

12/08/2024 0 Comments 0 tags

Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root privileges to the devices and stage follow-on attacks. The elevated

EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files

12/08/2024 0 Comments 0 tags

The Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and trojans as part of a spear-phishing campaign codenamed EastWind. The

Rogue PyPI Library Solana Users, Steals Blockchain Wallet Keys

11/08/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library from the Solana blockchain platform but is actually designed to