The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

18/10/2024 0 Comments 0 tags

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some misplaced, and others might even be missing entirely. Keeping your

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

18/10/2024 0 Comments 0 tags

Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency, Consent, and Control (TCC) framework in macOS that has likely come under exploitation to get around a user’s

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

17/10/2024 0 Comments 0 tags

The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late

Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

17/10/2024 0 Comments 0 tags

Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group’s affiliate panel on the dark web. Singapore-headquartered Group-IB said it

SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

17/10/2024 0 Comments 0 tags

An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and strategic infrastructures in the Middle East and

U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

17/10/2024 0 Comments 0 tags

Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record 35,000 DDoS attacks in a single year,

Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

17/10/2024 0 Comments 0 tags

A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused to gain root access under certain circumstances. The vulnerability, tracked as

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

16/10/2024 0 Comments 0 tags

Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it

FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

16/10/2024 0 Comments 0 tags

The FIDO Alliance said it’s working to make passkeys and other credentials more easier to export across different providers and improve credential provider interoperability, as more than 12 billion online

From Misuse to Abuse: AI Risks and Attacks

16/10/2024 0 Comments 0 tags

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and even other AI applications Cybercriminals and AI: The Reality vs.