Cloud Security Tops Concerns for Cybersecurity Leaders: EC-Council’s Certified CISO Hall of Fame Report 2023

03/06/2023 0 Comments 0 tags

A survey of global cybersecurity leaders through the 2023 Certified CISO Hall of Fame Report commissioned by the EC-Council identified 4 primary areas of grave concern: cloud security, data security,

New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal

03/06/2023 0 Comments 0 tags

An analysis of the Linux variant of a new ransomware strain called BlackSuit has covered significant similarities with another ransomware family called Royal. Trend Micro, which examined an x64 VMware ESXi

Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering

02/06/2023 0 Comments 0 tags

The Chinese nation-stage group known as Camaro Dragon has been linked to yet another backdoor that’s designed to meet its intelligence-gathering goals. Israeli cybersecurity firm Check Point, which dubbed the Go-based malware TinyNote, said

The Importance of Managing Your Data Security Posture

02/06/2023 0 Comments 0 tags

Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the opportunity to provide evidence-based security that proves how their data

New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America

02/06/2023 0 Comments 0 tags

Spanish-speaking users in Latin America have been at the receiving end of a new botnet malware dubbed Horabot since at least November 2020. “Horabot enables the threat actor to control the victim’s

NIST 2022 Cybersecurity & Privacy Annual Report

02/06/2023 0 Comments 0 tags

This week, NIST released the newly redesigned and streamlined Special Publication 800-225, Fiscal Year (FY) 2022 Cybersecurity and Privacy Annual Report. In FY 2022, the NIST Information Technology Laboratory’s (ITL)

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics

02/06/2023 0 Comments 0 tags

The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an attempt to bypass security guardrails and achieve their goals. The

How Wazuh Improves IT Hygiene for Cyber Security Resilience

02/06/2023 0 Comments 0 tags

IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running properly. Good IT hygiene includes vulnerability management, security configuration assessments, maintaining

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

02/06/2023 0 Comments 0 tags

Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code to sidestep detection by application security tools. “It may be the first

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin

02/06/2023 0 Comments 0 tags

Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime actor known as XE Group. According to Menlo Security, which pieced together