U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in malicious cyber activities on behalf of the Iranian...
View ArticleState-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
[[{“value”:” A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert data collection on target environments. Cisco Talos, which...
View ArticleGoogle Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny
Google has once again pushed its plans to deprecate third-party tracking cookies in its Chrome web browser as it works to address outstanding competition concerns from U.K. regulators over its Privacy...
View ArticleNetwork Threats: A Step-by-Step Attack Demonstration
[[{“value”:” Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need...
View ArticleThe Annual Cyber Security In Financial Services Summit 2024
[[{“value”:” June 11, 2024Location: London, United Kingdom City & Financial Global’s 10th edition of its annual Cyber Security in Financial Services Summit event taking place on 11th June. The...
View ArticleNorth Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
[[{“value”:” The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT as part of attacks...
View ArticleHackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on...
Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress that could allow site takeovers. The shortcoming, tracked as CVE-2024-27956, carries...
View Article10 Critical Endpoint Security Tips You Should Know
[[{“value”:” In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And because of this, endpoints are one of hackers’ favorite...
View ArticleSevere Flaws Disclosed in Brocade SANnav SAN Management Software
[[{“value”:” Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited to compromise susceptible appliances. The 18 flaws impact...
View ArticleBogus npm Packages Used to Trick Software Developers into Installing Malware
An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick them into downloading a Python backdoor. Cybersecurity firm...
View Article