6 Simple Steps to Eliminate SOC Analyst Burnout

10/10/2024 0 Comments 0 tags

The current SOC model relies on a scarce resource: human analysts. These professionals are expensive, in high demand, and increasingly difficult to retain. Their work is not only highly technical

Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms

10/10/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a new digital skimmer campaign that leverages Unicode obfuscation techniques to conceal a skimmer dubbed Mongolian Skimmer. “At first glance, the thing that stood

CISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches

10/10/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Firefox Zero-Day Under Attack: Update Your Browser Immediately

10/10/2024 0 Comments 0 tags

Mozilla has revealed that a critical security flaw impacting Firefox and Firefox Extended Support Release (ESR) has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-9680, has

Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

09/10/2024 0 Comments 0 tags

Google on Wednesday announced a new partnership with the Global Anti-Scam Alliance (GASA) and DNS Research Federation (DNS RF) to combat online scams. The initiative, which has been codenamed the

N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware

09/10/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed targeting job seekers in the tech industry to deliver updated versions of known malware families tracked as BeaverTail and InvisibleFerret.

Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries

09/10/2024 0 Comments 0 tags

Details have emerged about multiple security vulnerabilities in two implementations of the Manufacturing Message Specification (MMS) protocol that, if successfully exploited, could have severe impacts in industrial environments. “The vulnerabilities

Social Media Accounts: The Weak Link in Organizational SaaS Security

09/10/2024 0 Comments 0 tags

Social media accounts help shape a brand’s identity and reputation. These public forums engage directly with customers as they are a hub to connect, share content and answer questions. However,

Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild

09/10/2024 0 Comments 0 tags

Microsoft has released security updates to fix a total of 118 vulnerabilities across its software portfolio, two of which have come under active exploitation in the wild. Of the 118

Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks

09/10/2024 0 Comments 0 tags

Microsoft is warning of cyber attack campaigns that abuse legitimate file hosting services such as SharePoint, OneDrive, and Dropbox that are widely used in enterprise environments as a defense evasion