New SkidMap Linux Malware Variant Targeting Vulnerable Redis Servers

07/08/2023 0 Comments 0 tags

Vulnerable Redis services have been targeted by a “new, improved, dangerous” variant of a malware called SkidMap that’s engineered to target a wide range of Linux distributions. “The malicious nature of this

New ‘Deep Learning Attack’ Deciphers Laptop Keystrokes with 95% Accuracy

07/08/2023 0 Comments 0 tags

A group of academics has devised a “deep learning-based acoustic side-channel attack” that can be used to classify laptop keystrokes that are recorded using a nearby phone with 95% accuracy.

Enhancing Security Operations Using Wazuh: Open Source XDR and SIEM

07/08/2023 0 Comments 0 tags

In today’s interconnected world, evolving security solutions to meet growing demand is more critical than ever. Collaboration across multiple solutions for intelligence gathering and information sharing is indispensable. The idea

North Korean Hackers Targets Russian Missile Engineering Firm

07/08/2023 0 Comments 0 tags

Two different North Korean nation-state actors have been linked to a cyber intrusion against the major Russian missile engineering company NPO Mashinostroyeniya. Cybersecurity firm SentinelOne said it identified “two instances of North

Researchers Uncover New High-Severity Vulnerability in PaperCut Software

05/08/2023 0 Comments 0 tags

Cybersecurity researchers have discovered a new high-severity security flaw in PaperCut print management software for Windows that could result in remote code execution under specific circumstances. Tracked as CVE-2023-39143 (CVSS score: 8.4),

Microsoft Addresses Critical Power Platform Flaw After Delays and Criticism

05/08/2023 0 Comments 0 tags

Microsoft on Friday disclosed that it has addressed a critical security flaw impacting Power Platform, but not before it came under criticism for its failure to swiftly act on it.

Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems

05/08/2023 0 Comments 0 tags

Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. “Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by

MDR: Empowering Organizations with Enhanced Security

05/08/2023 0 Comments 0 tags

Managed Detection and Response (MDR) has emerged as a crucial solution for organizations looking to bolster their security measures. MDR allows businesses to outsource the management of Endpoint Detection and

Webinar – Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges

04/08/2023 0 Comments 0 tags

Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security and identity teams face inherent obstacles during the PAM journey,

NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack

04/08/2023 0 Comments 0 tags

A married couple from New York City has pleaded guilty to money laundering charges in connection with the 2016 hack of cryptocurrency stock exchange Bitfinex, resulting in the theft of