Searching for AI Tools? Watch Out for Rogue Sites Distributing RedLine Malware

20/05/2023 0 Comments 0 tags

Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being used to direct users to sketchy websites as part of a BATLOADER campaign designed to

WebKit Under Attack: Apple Issues Emergency Patches for 3 New Zero-Day Vulnerabilities

20/05/2023 0 Comments 0 tags

Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web browser to address three new zero-day flaws that it said are being actively exploited in

This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide

20/05/2023 0 Comments 0 tags

A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain risks. “The infection turns these devices into

Zero Trust + Deception: Join This Webinar to Learn How to Outsmart Attackers!

20/05/2023 0 Comments 0 tags

Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead of current and future attacks, it’s essential to simplify and reframe your defenses. Zscaler Deception

How to Reduce Exposure on the Manufacturing Attack Surface

20/05/2023 0 Comments 0 tags

Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital

Escalating China-Taiwan Tensions Fuel Alarming Surge in Cyber Attacks

20/05/2023 0 Comments 0 tags

The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber attacks on the East Asian island country. “From malicious emails and URLs to malware, the

8220 Gang Exploiting Oracle WebLogic Flaw to Hijack Servers and Mine Cryptocurrency

20/05/2023 0 Comments 0 tags

The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware.

Privacy Sandbox Initiative: Google to Phase Out Third-Party Cookies Starting 2024

20/05/2023 0 Comments 0 tags

Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it slowly works its way to deprecate support for third-party cookies in Chrome browser. To that

OilAlpha: Emerging Houthi-linked Cyber Threat Targets Arabian Android Users

17/05/2023 0 Comments 0 tags

A hacking group dubbed OilAlpha with suspected ties to Yemen’s Houthi movement has been linked to a cyber espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. “OilAlpha used encrypted

Identifying a Patch Management Solution: Overview of Key Criteria

17/05/2023 0 Comments 0 tags

Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or patched – to fix bugs, address vulnerabilities, and update key features