The Importance of Managing Your Data Security Posture

02/06/2023 0 Comments 0 tags

Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the opportunity to provide evidence-based security that proves how their data

New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America

02/06/2023 0 Comments 0 tags

Spanish-speaking users in Latin America have been at the receiving end of a new botnet malware dubbed Horabot since at least November 2020. “Horabot enables the threat actor to control the victim’s

NIST 2022 Cybersecurity & Privacy Annual Report

02/06/2023 0 Comments 0 tags

This week, NIST released the newly redesigned and streamlined Special Publication 800-225, Fiscal Year (FY) 2022 Cybersecurity and Privacy Annual Report. In FY 2022, the NIST Information Technology Laboratory’s (ITL)

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics

02/06/2023 0 Comments 0 tags

The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an attempt to bypass security guardrails and achieve their goals. The

How Wazuh Improves IT Hygiene for Cyber Security Resilience

02/06/2023 0 Comments 0 tags

IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running properly. Good IT hygiene includes vulnerability management, security configuration assessments, maintaining

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

02/06/2023 0 Comments 0 tags

Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code to sidestep detection by application security tools. “It may be the first

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin

02/06/2023 0 Comments 0 tags

Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime actor known as XE Group. According to Menlo Security, which pieced together

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware

02/06/2023 0 Comments 0 tags

A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. “The targets are infected using

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

02/06/2023 0 Comments 0 tags

An analysis of the “evasive and tenacious” malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day. What’s more, 50%

MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited

02/06/2023 0 Comments 0 tags

A critical flaw in Progress Software’s in MOVEit Transfer managed file transfer application has come under widespread exploitation in the wild to take over vulnerable systems. The shortcoming, which is