Leveraging Wazuh for Zero Trust security

05/11/2024 0 Comments 0 tags

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing and validating access requests. Contrary to perimeter-based security, users within an environment are

New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers

05/11/2024 0 Comments 0 tags

Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudulent banking transactions. “ToxicPanda’s main goal is

Canadian Suspect Arrested Over Snowflake Data Breach and Extortion Attacks

05/11/2024 0 Comments 0 tags

Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of hacks stemming from the breach of cloud data warehousing platform Snowflake earlier this

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

05/11/2024 0 Comments 0 tags

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

05/11/2024 0 Comments 0 tags

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning

04/11/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning,

Google’s AI Tool Big Sleep Finds Zero-Day Vulnerability in SQLite Database Engine

04/11/2024 0 Comments 0 tags

Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language model (LLM) assisted framework called Big Sleep (formerly Project Naptime). The tech giant

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

04/11/2024 0 Comments 0 tags

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 – Nov 03)

04/11/2024 0 Comments 0 tags

This week was a total digital dumpster fire! Hackers were like, “Let’s cause some chaos!” and went after everything from our browsers to those fancy cameras that zoom and spin.

German Police Disrupt DDoS-for-Hire Platform dstat[.]cc; Suspects Arrested

04/11/2024 0 Comments 0 tags

German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it possible for other threat actors to easily mount distributed denial-of-service (DDoS) attacks. “The