How to Achieve the Best Risk-Based Alerting (Bye-Bye SIEM)

19/02/2024 0 Comments 0 tags

Did you know that Network Detection and Response (NDR) has become the most effective technology to detect cyber threats? In contrast to SIEM, NDR offers adaptive cybersecurity with reduced false

Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices

19/02/2024 0 Comments 0 tags

Meta Platforms said it took a series of steps to curtail malicious activity from eight different firms based in Italy, Spain, and the United Arab Emirates (U.A.E.) operating in the

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

19/02/2024 0 Comments 0 tags

The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with a new backdoor called BASICSTAR by creating a

Russian-Linked Hackers Target 80+ Organizations via Roundcube Flaws

19/02/2024 0 Comments 0 tags

Threat actors operating with interests aligned to Belarus and Russia have been linked to a new cyber espionage campaign that likely exploited cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

19/02/2024 0 Comments 0 tags

A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka

How Businesses Can Safeguard Their Communication Channels Against Hackers

17/02/2024 0 Comments 0 tags

Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays, and overlaps. Externally, frustration-free customer communication is directly

Google Open Sources Magika: AI-Powered File Identification Tool

17/02/2024 0 Comments 0 tags

Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary and textual file types. “Magika outperforms conventional file identification

CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

16/02/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities

U.S. State Government Network Breached via Former Employee’s Account

16/02/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed state government organization’s network environment was compromised via an administrator account belonging to a former employee. “This

Malicious ‘SNS Sender’ Script Abuses AWS for Bulk Smishing Attacks

16/02/2024 0 Comments 0 tags

A malicious Python script known as SNS Sender is being advertised as a way for threat actors to send bulk smishing messages by abusing Amazon Web Services (AWS) Simple Notification Service (SNS).