Top

Category: Security


Cybersecurity, Security

6 Types of Applications Security Testing You Must Know About

July 25, 2024

Via: The Hacker News

Application security testing is a critical component of modern software development, ensuring that applications are robust and resilient against malicious attacks. As cyber threats continue to evolve in complexity and frequency, the need to integrate comprehensive security measures throughout the […]


Hacking, Security

PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks

July 11, 2024

Via: The Hacker News

Multiple threat actors have been observed exploiting a recently disclosed security flaw in PHP to deliver remote access trojans, cryptocurrency miners, and distributed denial-of-service (DDoS) botnets. The vulnerability in question is CVE-2024-4577 (CVSS score: 9.8), which allows an attacker to […]


Hacking, Security

New Ransomware Group Exploiting Veeam Backup Software Vulnerability

July 10, 2024

Via: The Hacker News

A now-patched security flaw in Veeam Backup & Replication software is being exploited by a nascent ransomware operation known as EstateRansomware. Singapore-headquartered Group-IB, which discovered the threat actor in early April 2024, said the modus operandi involved the exploitation of […]


Cybersecurity, Security

5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy

July 8, 2024

Via: The Hacker News

Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late June 2024 – barely raise public eyebrows anymore. Yet businesses, and the people that lead them, are justifiably jittery. Every CISO knows […]


Cybersecurity, Security

How evolving AI regulations impact cybersecurity

July 2, 2024

Via: InfoWorld

While their business and tech colleagues are busy experimenting and developing new applications, cybersecurity leaders are looking for ways to anticipate and counter new, AI-driven threats. It’s always been clear that AI impacts cybersecurity, but it’s a two-way street. Where […]


Hacking, Security

CapraRAT Spyware Disguised as Popular Apps Threatens Android Users

July 1, 2024

Via: The Hacker News

The threat actor known as Transparent Tribe has continued to unleash malware-laced Android apps as part of a social engineering campaign to target individuals of interest. “These APKs continue the group’s trend of embedding spyware into curated video browsing applications, […]


Hacking, Security

Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs

June 20, 2024

Via: The Hacker News

Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.5), the “UEFIcanhazbufferoverflow” vulnerability has been described as a […]


Hacking, Security

Cybercriminals Employ PhantomLoader to Distribute SSLoad Malware

June 13, 2024

Via: The Hacker News

The nascent malware known as SSLoad is being delivered by means of a previously undocumented loader called PhantomLoader, according to findings from cybersecurity firm Intezer. “The loader is added to a legitimate DLL, usually EDR or AV products, by binary […]


Cybersecurity, Security

Beyond Threat Detection – A Race to Digital Security

May 31, 2024

Via: The Hacker News

Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across the globe. The sharing of digital content has increased significantly in recent years, mainly via email, digital documents, and chat. In turn, this […]


Cybersecurity, Security

Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices

May 31, 2024

Via: The Hacker News

Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late 2023. “These repeated attacks against OT devices emphasize the crucial need to improve the security posture of […]


Cybersecurity, Security

White House calls on tech companies to help stop deepfakes

May 23, 2024

Via: Mashable

The Biden administration has made clear its stance on deepfakes: Technology companies must play a critical role in stopping such imagery, which is generated by artificial intelligence. On Thursday, the White House published a list of steps tech companies should […]


Privacy, Security

7 Common VPN Myths You Might Still Believe

May 22, 2024

Via: Big Data Analytics News

How many times this week were you warned by your antivirus or a popup of the site you visited that hackers have knowledge of your IP address or even bank accounts? Chances are that you were also recommended to use […]


Computing, Cybersecurity, Security, Software & Applications

12 principles for improving devsecops

May 20, 2024

Via: InfoWorld

I once transitioned from a SaaS CTO role to become a business unit CIO at a Fortune 100 enterprise that aimed to bring startup development processes, technology, and culture into the organization. The executives recognized the importance of developing customer-facing […]


Cybersecurity, Security

Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks

May 15, 2024

Via: The Hacker News

The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing the client management tool Quick Assist to target users in social engineering attacks. “Storm-1811 is a financially motivated cybercriminal group known to […]


Cybersecurity, Security

7 application security startups at RSAC 2024

May 14, 2024

Via: InfoWorld

The innovation hub of RSAC 2024, the RSAC Early Stage Expo was specifically designed to showcase emerging players in the information security industry. Among the 50 exhibitors crammed into the second floor booth space, seven VC-backed up-and-comers in application security […]


Cybersecurity, Internet, Security, Wireless & Cloud

The Fundamentals of Cloud Security Stress Testing

May 8, 2024

Via: The Hacker News

״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them. The traditional approach for defenders is to list […]


Hacking, Security

China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

May 7, 2024

Via: The Hacker News

The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence of the intrusion now dates back to December 31, 2023. The attack, which came to light last month, singled out MITRE’s Networked […]


Hacking, Security

New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs

May 6, 2024

Via: The Hacker News

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that’s designed to set up persistence on the infected hosts and act as a spyware. Dubbed Cuckoo by Kandji, the malware is a universal Mach-O binary that’s capable […]


Cybersecurity, Security

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

May 3, 2024

Via: The Hacker News

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders need to address, since the […]


Apps & OS, Mobile, Privacy, Security

4 billion Android users who downloaded apps flagged by Microsoft need to take some actions to stay safe

May 3, 2024

Via: PhoneArena

Microsoft has identified some popular apps downloaded by over 4 billion Android users that can put users at risk. In a blog post published by the company, it has revealed that it discovered a vulnerability pattern in multiple Android applications […]