What’s the Right EDR for You?

10/05/2024 0 Comments 0 tags

A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

10/05/2024 0 Comments 0 tags

Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

10/05/2024 0 Comments 0 tags

Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

10/05/2024 0 Comments 0 tags

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms.

New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation

09/05/2024 0 Comments 0 tags

Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim’s network traffic by just being on the same local network. The “decloaking” method has

Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery

09/05/2024 0 Comments 0 tags

Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous Mirai botnet. That’s according to findings from Juniper Threat Labs, which said the vulnerabilities CVE-2023-46805 and

New Guide: How to Scale Your vCISO Services Profitably

09/05/2024 0 Comments 0 tags

Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to hire a full-time CISO. A vCISO can answer this need by offering on-demand access

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

09/05/2024 0 Comments 0 tags

Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked nation-state actor called APT28. “The campaign sent emails with content intended to arouse the

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

09/05/2024 0 Comments 0 tags

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the devices and create hidden rogue administrator

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

08/05/2024 0 Comments 0 tags

A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to create rogue admin accounts on susceptible websites. The findings come from WPScan, which said that the vulnerability