The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

14/05/2024 0 Comments 0 tags

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From account takeovers to malicious extensions to phishing attacks, the

MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices

14/05/2024 0 Comments 0 tags

The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in critical infrastructure environments. “The model provides a cultivated knowledge base of cyber

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

11/05/2024 0 Comments 0 tags

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. “The threat actors used

Researchers Uncover ‘LLMjacking’ Scheme Targeting Cloud-Hosted AI Models

10/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

10/05/2024 0 Comments 0 tags

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. “This malware uses famous Android app icons

What’s the Right EDR for You?

10/05/2024 0 Comments 0 tags

A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

10/05/2024 0 Comments 0 tags

Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

10/05/2024 0 Comments 0 tags

Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, “The Future of Threat

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

10/05/2024 0 Comments 0 tags

The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms.

New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation

09/05/2024 0 Comments 0 tags

Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim’s network traffic by just being on the same local network. The “decloaking” method has