Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar

26/09/2024 0 Comments 0 tags

Imagine trying to find a needle in a haystack, but the haystack is on fire, and there are a million other needles you also need to find. That’s what dealing

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

26/09/2024 0 Comments 0 tags

An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

26/09/2024 0 Comments 0 tags

Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

25/09/2024 0 Comments 0 tags

Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

25/09/2024 0 Comments 0 tags

Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

25/09/2024 0 Comments 0 tags

Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature

Expert Tips on How to Spot a Phishing Link

25/09/2024 0 Comments 0 tags

Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it’s too late. See these key indicators

Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises

25/09/2024 0 Comments 0 tags

Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of

ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

25/09/2024 0 Comments 0 tags

A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible for attackers to plant long-term persistent spyware into the artificial intelligence (AI) tool’s memory. The

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

25/09/2024 0 Comments 0 tags

Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster,