Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

09/03/2024 0 Comments 0 tags

Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that

Secrets Sensei: Conquering Secrets Management Challenges

09/03/2024 0 Comments 0 tags

In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management — the foundational pillar upon which your security infrastructure rests. We’re all familiar with

Meta Details WhatsApp and Messenger Interoperability to Comply with EU’s DMA Regulations

09/03/2024 0 Comments 0 tags

Meta has offered details on how it intends to implement interoperability in WhatsApp and Messenger with third-party messaging services as the Digital Markets Act (DMA) went into effect in the

Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

09/03/2024 0 Comments 0 tags

Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems

Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

07/03/2024 0 Comments 0 tags

Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a variety of malware targeting both Android and Windows

New Python-Based Snake Info Stealer Spreading Through Facebook Messages

07/03/2024 0 Comments 0 tags

Facebook messages are being used by threat actors to a Python-based information stealer dubbed Snake that’s designed to capture credentials and other sensitive data. “The credentials harvested from unsuspecting users

Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China

07/03/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) announced the indictment of a 38-year-old Chinese national and a California resident of allegedly stealing proprietary information from Google while covertly working for two

Human vs. Non-Human Identity in SaaS

07/03/2024 0 Comments 0 tags

In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security management and requires strict governance of user

Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

07/03/2024 0 Comments 0 tags

The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end of the attacks is to deliver

Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

07/03/2024 0 Comments 0 tags

Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form of distributed brute-force attacks, “target