Why Is It So Challenging to Go Passwordless?

11/09/2024 0 Comments 0 tags

Imagine a world where you never have to remember another password. Seems like a dream come true for both end users and IT teams, right? But as the old saying

Singapore Police Arrest Six Hackers Linked to Global Cybercrime Syndicate

11/09/2024 0 Comments 0 tags

The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their alleged involvement in illicit cyber activities in the country. The development

Developers Beware: Lazarus Group Uses Fake Coding Tests to Spread Malware

11/09/2024 0 Comments 0 tags

Cybersecurity researchers have uncovered a new set of malicious Python packages that target software developers under the guise of coding assessments. “The new samples were tracked to GitHub projects that

Ivanti Releases Urgent Security Updates for Endpoint Manager Vulnerabilities

11/09/2024 0 Comments 0 tags

Ivanti has released software updates to address multiple security flaws impacting Endpoint Manager (EPM), including 10 critical vulnerabilities that could result in remote code execution. A brief description of the

Microsoft Issues Patches for 79 Flaws, Including 3 Actively Exploited Windows Flaws

11/09/2024 0 Comments 0 tags

Microsoft on Tuesday disclosed that three new security flaws impacting the Windows platform have come under active exploitation as part of its Patch Tuesday update for September 2024. The monthly

CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub

10/09/2024 0 Comments 0 tags

The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- and medium-sized businesses (SMBs) in Europe, Asia, Africa, and South America,

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

10/09/2024 0 Comments 0 tags

A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating sensitive information by taking advantage of the noise generated by

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

10/09/2024 0 Comments 0 tags

Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

10/09/2024 0 Comments 0 tags

A trio of threat activity clusters linked to China has been observed compromising more government organizations in Southeast Asia as part of a renewed state-sponsored operation codenamed Crimson Palace, indicating

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

10/09/2024 0 Comments 0 tags

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate data exfiltration and the deployment of next-stage payloads, according to