It’s Time to Master the Lift & Shift: Migrating from VMware vSphere to Microsoft Azure

15/05/2024 0 Comments 0 tags

While cloud adoption has been top of mind for many IT professionals for nearly a decade, it’s only in recent months, with industry changes and announcements from key players, that many recognize

Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions

15/05/2024 0 Comments 0 tags

An unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the Middle East were targeted by two previously undocumented backdoors tracked as LunarWeb and LunarMail. ESET,

Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering

15/05/2024 0 Comments 0 tags

A Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash cryptocurrency mixer service to 5 years and 4 months in prison. While the name of the defendant was redacted in the verdict,

Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days

15/05/2024 0 Comments 0 tags

Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May 2024, including two zero-days which have been actively exploited in the wild. Of the 61

VMware Patches Severe Security Flaws in Workstation and Fusion Products

15/05/2024 0 Comments 0 tags

Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive information, trigger a denial-of-service (DoS) condition, and execute code under

New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation

15/05/2024 0 Comments 0 tags

Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild. The high-severity vulnerability, tracked as CVE-2024-4761,

Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code

14/05/2024 0 Comments 0 tags

The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues that could lead to the execution of arbitrary code. The

6 Mistakes Organizations Make When Deploying Advanced Authentication

14/05/2024 0 Comments 0 tags

Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor authentication in place is a great start, but many organizations may

Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls

14/05/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining initial access to their environments for follow-on exploitation. “The incident involves a

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

14/05/2024 0 Comments 0 tags

Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both iOS and Android if a Bluetooth tracking device is being used to