Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers

24/07/2024 0 Comments 0 tags

A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to deliver information stealers such as ACR Stealer, Lumma, and Meduza.

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

24/07/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed

How to Reduce SaaS Spend and Risk Without Impacting Productivity

24/07/2024 0 Comments 0 tags

There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have reached an era where purpose-built tools exist for almost every aspect of modern business and

Chinese Hackers Target Taiwan and US NGO with MgBot Malware

23/07/2024 0 Comments 0 tags

Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking group called Daggerfly using an upgraded set of malware tools.

New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure

23/07/2024 0 Comments 0 tags

Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in a disruptive cyber attack targeting an energy company in the

Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

23/07/2024 0 Comments 0 tags

Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a

Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model

23/07/2024 0 Comments 0 tags

Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its “pay or consent” advertising model or risk-facing enforcement measures, including

Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware

23/07/2024 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in the country with malware known as HATVIBE and CHERRYSPY. The

How to Securely Onboard New Employees Without Sharing Temporary Passwords

23/07/2024 0 Comments 0 tags

The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of sharing temporary first-day passwords, which can expose organizations to

Google Abandons Plan to Phase Out Third-Party Cookies in Chrome

23/07/2024 0 Comments 0 tags

Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years after it introduced the option as part of a larger