ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families

26/09/2023 0 Comments 0 tags

Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many as seven different ransomware families over the past year. “ShadowSyndicate

Essential Guide to Cybersecurity Compliance

26/09/2023 0 Comments 0 tags

SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can make even a compliance expert’s head spin. If you’re embarking

Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial Institutions

26/09/2023 0 Comments 0 tags

An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions in the U.S. The campaign, according to Dutch security firm ThreatFabric, leverages phishing web

Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic

26/09/2023 0 Comments 0 tags

How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry Gain insights to help improve and accelerate your organization’s threat

Microsoft is Rolling out Support for Passkeys in Windows 11

26/09/2023 0 Comments 0 tags

Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to the desktop operating system. The feature allows users to login to websites and

Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign

26/09/2023 0 Comments 0 tags

A “multi-year” Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government organizations. Recorded Future’s Insikt Group, which is tracking the activity under the moniker TAG-74, said

Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers

26/09/2023 0 Comments 0 tags

A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be exploited by unauthenticated attackers to achieve remote code execution on affected systems. The

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

25/09/2023 0 Comments 0 tags

Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. “Since drones or Unmanned Aerial

Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks

25/09/2023 0 Comments 0 tags

Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools like ChatGPT are unleashing waves of productivity across the business, from IT, to

Are You Willing to Pay the High Cost of Compromised Credentials?

25/09/2023 0 Comments 0 tags

Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83% of compromised passwords would satisfy the password complexity and length requirements of