6.6 C
Munich
Sunday, May 12, 2024
- Advertisement -

ARCHIVE

Monthly Archives: July, 2023

CISA Issues Warnings as New Vulnerabilities in MOVEit Software Expose Sensitive Information

The federal government issues a strong warning about three recently discovered vulnerabilities in the popular MOVEit file transfer software. These vulnerabilities have played a...

Beware of “Letscall”: Advanced Vishing Technique

Researchers have recently sounded the alarm about a sophisticated and emerging form of voice phishing (vishing) called "Letscall." This alarming technique is currently being...

Decoding the TA453 Threat: Unleashing Advanced Malware Campaigns Targeting Windows and macOS

TA453, a sophisticated nation-state actor, has been identified as an entity closely associated with various other notorious groups such as Charming Kitten, PHOSPHORUS, and...

The Internet of Medical Things and Cybersecurity Risk

The healthcare and life sciences industry continues to be plagued by cybersecurity threats.1 According to FTI Consulting’s U.S. Healthcare & Life Sciences Industry Outlook...

White Snake Stealer: A Formidable Info Stealer Targeting Windows and Linux Platforms

White Snake Stealer, an advanced information stealer, has recently evolved with enhanced features, making it capable of targeting both Windows and Linux platforms. This...

Critical Flaw in Fortinet Firewalls Exposes SSL VPN Interfaces: Over 490,000 Devices Vulnerable

A recent report reveals a critical flaw in Fortinet firewalls, leaving over 490,000 devices at risk of exploitation. This article explores the vulnerability, its...

Unmasking SmugX: Chinese Hackers Deploy Stealthy HTML Smuggling Techniques in Europe

A sophisticated Chinese nation-state group has been identified employing HTML smuggling techniques to target Foreign Affairs ministries and embassies in Europe. The campaign, named...

The Pros and Cons of Virtual Chief Information Security Officers (vCISOs)

An increasing number of modern security-conscious companies have Chief Information Security Officers (CISOs) on their payroll to manage the growing threat of sophisticated cyber...

Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the ransom

Avast, the renowned cybersecurity firm, has released a free decryptor for the Akira ransomware. This decryptor enables victims to recover their encrypted data without...

Half of EDR Tools, Organizations Vulnerable to Clop Ransomware, Research Says

In recent assessments conducted by cybersecurity company Cymulate, it was revealed that nearly half of the endpoint detection and response (EDR) tools and organizations...

Latest news

- Advertisement -