CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

22/10/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

21/10/2024 0 Comments 0 tags

The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)

21/10/2024 0 Comments 0 tags

Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were secure—like finding hidden doors in locked houses.

Guide:  The Ultimate Pentest Checklist for Full-Stack Security

21/10/2024 0 Comments 0 tags

Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

21/10/2024 0 Comments 0 tags

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to leak sensitive data. “The vulnerabilities range in severity: in many

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

20/10/2024 0 Comments 0 tags

Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as part of a phishing attack designed to steal user credentials.

Acronym Overdose – Navigating the Complex Data Security Landscape

19/10/2024 0 Comments 0 tags

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

19/10/2024 0 Comments 0 tags

A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of

Beware: Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

18/10/2024 0 Comments 0 tags

Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver infostealers targeting Windows and macOS systems. “This tactic involves displaying

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

18/10/2024 0 Comments 0 tags

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks. “Since