FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data

11/01/2024 0 Comments 0 tags

The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as X-Mode Social, from sharing or selling any sensitive location data with third-parties. The

Free Decryptor Released for Black Basta and Babuk’s Tortilla Ransomware Victims

11/01/2024 0 Comments 0 tags

A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by the malware to regain access to their files. The cybersecurity firm said

Getting off the Attack Surface Hamster Wheel: Identity Can Help

11/01/2024 0 Comments 0 tags

IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it.  The process is simple: begin

NoaBot: Latest Mirai-Based Botnet Targeting SSH Servers for Crypto Mining

11/01/2024 0 Comments 0 tags

A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign since the beginning of 2023. “The capabilities of the new botnet, NoaBot, include

North Korea’s Cyber Heist: DPRK Hackers Stole $600 Million in Cryptocurrency in 2023

09/01/2024 0 Comments 0 tags

Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea) have plundered at least $600 million in cryptocurrency in 2023. The DPRK “was responsible for

DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud

09/01/2024 0 Comments 0 tags

The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct xDedic Marketplace, which is estimated to have facilitated more than $68 million in

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

09/01/2024 0 Comments 0 tags

The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise as a result of increased deployment of artificial intelligence (AI) systems in

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

09/01/2024 0 Comments 0 tags

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

09/01/2024 0 Comments 0 tags

Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

09/01/2024 0 Comments 0 tags

Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass security software and stealthily launch hidden applications. “The developers operate