Secrets Exposed: Why Your CISO Should Worry About Slack

03/09/2024 0 Comments 0 tags

In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

03/09/2024 0 Comments 0 tags

Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system’s permissions-based model,

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

03/09/2024 0 Comments 0 tags

A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a failed data extortion campaign that targeted his former employer. Daniel Rhyne of Kansas City,

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

02/09/2024 0 Comments 0 tags

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span

Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

02/09/2024 0 Comments 0 tags

The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more sophisticated. In this high-stakes game, security leaders need every advantage

Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

02/09/2024 0 Comments 0 tags

The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the FBI and CISA issued a joint advisory as part of

Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

02/09/2024 0 Comments 0 tags

Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again underscoring how threat actors continue to exploit the trust in

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

31/08/2024 0 Comments 0 tags

A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North Korean actors in a campaign designed to deliver the FudModule

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

30/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from

Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

30/08/2024 0 Comments 0 tags

Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent targeting of U.S. political campaigns. Recorded Future’s Insikt Group has