Attack Surface Management vs. Vulnerability Management

03/04/2024 0 Comments 0 tags

Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they’re not the same. The main difference between attack surface management and vulnerability management is

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

03/04/2024 0 Comments 0 tags

Google on Tuesday said it’s piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users against session cookie theft by malware. The prototype –

U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

03/04/2024 0 Comments 0 tags

The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that led to the breach of nearly two dozen companies across Europe and the

Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

03/04/2024 0 Comments 0 tags

Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows – CVE-2024-29745 –

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

03/04/2024 0 Comments 0 tags

A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from databases, such as password hashes. The flaw, designated as CVE-2024-2879, carries a CVSS

Mispadu Trojan Targets Europe, Thousands of Credentials Compromised

03/04/2024 0 Comments 0 tags

The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland, and Sweden. Targets of the ongoing campaign include entities

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

02/04/2024 0 Comments 0 tags

The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux distributions, is also capable of facilitating remote code execution, a new analysis

China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations

02/04/2024 0 Comments 0 tags

A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar. “Earth Freybug is a cyberthreat group that has been active

Harnessing the Power of CTEM for Cloud Security

02/04/2024 0 Comments 0 tags

Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of data breaches were against public, private, or hybrid cloud

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

02/04/2024 0 Comments 0 tags

The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT.