The Facts About Continuous Penetration Testing and Why It’s Important

22/08/2024 0 Comments 0 tags

What is Continuous Attack Surface Penetration Testing or CASPT? Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is an advanced security practice that involves the continuous, automated, and

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

22/08/2024 0 Comments 0 tags

Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has come under active exploitation in the wild. Tracked as CVE-2024-7971,

Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access

22/08/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could permit unauthenticated users to gain administrator privileges. “The plugin suffers from an unauthenticated

GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

22/08/2024 0 Comments 0 tags

GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain site administrator privileges.

New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining

22/08/2024 0 Comments 0 tags

Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that’s designed to mine cryptocurrency after brute-forcing their way into PostgreSQL database instances. “Brute-force attacks on Postgres involve repeatedly attempting

Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data

21/08/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft’s Copilot Studio that could be exploited to access sensitive information. Tracked as CVE-2024-38206 (CVSS score: 8.5), the vulnerability has been

North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign

21/08/2024 0 Comments 0 tags

A new remote access trojan called MoonPeak has been discovered as being used by a state-sponsored North Korean threat activity cluster as part of a new campaign. Cisco Talos attributed

It’s Time To Untangle the SaaS Ball of Yarn

21/08/2024 0 Comments 0 tags

It’s no great revelation to say that SaaS applications have changed the way we operate, both in our personal and professional lives. We routinely rely on cloud-based and remote applications

Styx Stealer Creator’s OPSEC Fail Leaks Client List and Profit Details

21/08/2024 0 Comments 0 tags

In what’s a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called Styx Stealer leaked data from their own computer, including details related to

New macOS Malware TodoSwift Linked to North Korean Hacking Groups

21/08/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software used by North Korean hacking groups. “This application shares several