Top Security Posture Vulnerabilities Revealed

30/01/2024 0 Comments 0 tags

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It’s the nature of the field – the speed at which malicious actors carry

Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws

30/01/2024 0 Comments 0 tags

Juniper Networks has released out-of-band updates to address high-severity flaws in SRX Series and EX Series that could be exploited by a threat actor to take control of susceptible systems. The vulnerabilities,

Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords

29/01/2024 0 Comments 0 tags

A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager (NTLM) v2 hashed passwords when opening a specially crafted file. The issue,

Albabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and Golang

29/01/2024 0 Comments 0 tags

Cybersecurity researchers have detected in the wild yet another variant of the Phobos ransomware family known as Faust. Fortinet FortiGuard Labs, which detailed the latest iteration of the ransomware, said it’s

Riding the AI Waves: The Rise of Artificial Intelligence to Combat Cyber Threats

29/01/2024 0 Comments 0 tags

In nearly every segment of our lives, AI (artificial intelligence) now makes a significant impact: It can deliver better healthcare diagnoses and treatments; detect and reduce the risk of financial

493 Companies Share Their SaaS Security Battles – Get Insights in this Webinar

29/01/2024 0 Comments 0 tags

In today’s digital world, security risks are more prevalent than ever, especially when it comes to Software as a Service (SaaS) applications. Did you know that an alarming 97% of

NSA Admits Secretly Buying Your Internet Browsing Data without Warrants

29/01/2024 0 Comments 0 tags

The U.S. National Security Agency (NSA) has admitted to buying internet browsing records from data brokers to identify the websites and apps Americans use that would otherwise require a court

Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines

29/01/2024 0 Comments 0 tags

Cybersecurity researchers have identified malicious packages on the open-source Python Package Index (PyPI) repository that deliver an information stealing malware called WhiteSnake Stealer on Windows systems. The malware-laced packages are

AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks

28/01/2024 0 Comments 0 tags

Mexican financial institutions are under the radar of a new spear-phishing campaign that delivers a modified version of an open-source remote access trojan called AllaKore RAT. The BlackBerry Research and Intelligence

Malicious Ads on Google Target Chinese Users with Fake Messaging Apps

26/01/2024 0 Comments 0 tags

Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as part of an ongoing malvertising campaign. “The threat actor is abusing Google advertiser accounts