Beware: These Fake Antivirus Sites Spreading Android and Windows Malware

24/05/2024 0 Comments 0 tags

Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

24/05/2024 0 Comments 0 tags

Don’t be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they’re getting smarter every

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

24/05/2024 0 Comments 0 tags

Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information

Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024

24/05/2024 0 Comments 0 tags

Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the wild. Assigned the CVE identifier CVE-2024-5274, the

JAVS Courtroom Recording Software Backdoored – Deploys RustDoor Malware

24/05/2024 0 Comments 0 tags

Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver malware that’s associated with a known backdoor called RustDoor. The

Stealthy BLOODALCHEMY Malware Targeting Targeting ASEAN Governments

24/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to

Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern

23/05/2024 0 Comments 0 tags

Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed. “Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent

CISA Warns of Actively Exploited Apache Flink Security Vulnerability

23/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence

New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts

23/05/2024 0 Comments 0 tags

The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of an ongoing cyber espionage campaign. “The

Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager

23/05/2024 0 Comments 0 tags

Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager (EPM) that could be exploited to achieve remote code execution under certain circumstances. Six of