Top 5 Marketing Tech SaaS Security Challenges

13/11/2023 0 Comments 0 tags

Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach, Asana, Monday, and Box empower marketing teams, agencies, freelancers, and

New Ransomware Group Emerges with Hive’s Source Code and Infrastructure

13/11/2023 0 Comments 0 tags

The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the now-dismantled Hive operation to kick-start its own efforts in the threat landscape.

Microsoft Warns of Fake Skills Assessment Portals Targeting IT Job Seekers

13/11/2023 0 Comments 0 tags

A sub-cluster within the infamous Lazarus Group has established new infrastructure that impersonates skills assessment portals as part of its social engineering campaigns. Microsoft attributed the activity to a threat

Russian Hackers Sandworm Cause Power Outage in Ukraine Amidst Missile Strikes

11/11/2023 0 Comments 0 tags

The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage in October 2022. The findings come from Google’s Mandiant, which described the

Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan

10/11/2023 0 Comments 0 tags

Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole attack designed to deliver a previously undocumented

Iran-Linked Imperial Kitten Cyber Group Targeting Middle East’s Tech Sectors

10/11/2023 0 Comments 0 tags

A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October 2023 amid a surge in Iranian cyber activity since the

Alert: ‘Effluence’ Backdoor Persists Despite Patching Atlassian Confluence Servers

10/11/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a stealthy backdoor named Effluence that’s deployed following the successful exploitation of a recently disclosed security flaw in Atlassian Confluence Data Center and Server. “The malware acts as

The New 80/20 Rule for SecOps: Customize Where it Matters, Automate the Rest

10/11/2023 0 Comments 0 tags

There is a seemingly never-ending quest to find the right security tools that offer the right capabilities for your organization. SOC teams tend to spend about a third of their day on

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

09/11/2023 0 Comments 0 tags

Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting Israel. “The framework’s web component is written in the Go programming language,” Deep

When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules

09/11/2023 0 Comments 0 tags

While intended for convenience and efficient communication, email auto-forwarding rules can inadvertently lead to the unauthorized dissemination of sensitive information to external entities, putting confidential data at risk of exposure