New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers

09/11/2023 0 Comments 0 tags

A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. “This

Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability

09/11/2023 0 Comments 0 tags

The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in SysAid IT support software in limited attacks, according to new findings from

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

09/11/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Guide: How vCISOs, MSPs and MSSPs Can Keep their Customers Safe from Gen AI Risks

08/11/2023 0 Comments 0 tags

Download the free guide, “It’s a Generative AI World: How vCISOs, MSPs and MSSPs Can Keep their Customers Safe from Gen AI Risks.” ChatGPT now boasts anywhere from 1.5 to

Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPI

08/11/2023 0 Comments 0 tags

A new set of malicious Python packages has slithered their way to the Python Package Index (PyPI) repository with the ultimate aim of stealing sensitive information from compromised developer systems.

WhatsApp Introduces New Privacy Feature to Protect IP Address in Calls

08/11/2023 0 Comments 0 tags

Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called “Protect IP Address in Calls” that masks users’ IP addresses to other parties by relaying the calls

Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation

08/11/2023 0 Comments 0 tags

Cybersecurity researchers have developed what’s the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges. Cybersecurity company SafeBreach said it discovered three different methods

Experts Expose Farnetwork’s Ransomware-as-a-Service Business Model

08/11/2023 0 Comments 0 tags

Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different ransomware-as-a-service (RaaS) programs over the past four years in various capacities. Singapore-headquartered

Webinar: Kickstarting Your SaaS Security Strategy & Program

08/11/2023 0 Comments 0 tags

SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on SaaS apps, they also increase their reliance on those applications being secure. These

Confidence in File Upload Security is Alarmingly Low. Why?

07/11/2023 0 Comments 0 tags

Numerous industries—including technology, financial services, energy, healthcare, and government—are rushing to incorporate cloud-based and containerized web applications.  The benefits are undeniable; however, this shift presents new security challenges.  OPSWAT’s 2023