18.7 C
Munich
Saturday, May 4, 2024
- Advertisement -

ARCHIVE

Yearly Archives: 2023

Over 69 Million Individuals Affected from MOVEit Cyberattack in the State of Maine

The State of Maine has become the latest victim to reveal the significant impact of a cyberattack targeting a zero-day vulnerability in Progress Software's...

New ‘Digital Risk Protection’ Report from BrandShield Reveals Companies Lose $2.1M on Average to Each Online Attack 

The report surveyed 200 CISOs across the United States, United Kingdom, and Europe Only 6% of companies are reported to have avoided cyber attacks since...

Millenium RAT: Malware Sold on Github

Millenium-RAT, a sophisticated Remote Access Tool (RAT) for Windows systems is now available for purchase on GitHub. This sophisticated Remote Access Tool, or RAT,...

Confluence Vulnerabilities Under Active Ransomware Exploitation

The findings from Rapid7's recent study regarding the targeting of vulnerabilities in Atlassian Confluence Servers by multiple ransomware groups are concerning. It highlights the...

Marina Bay Sands Casino Resort Confirms Data Security Breach

Singapore's Marina Bay Sands, a renowned casino resort, has unfortunately fallen victim to a data security breach, impacting an estimated 665,000 non-casino rewards program...

North Korea-Linked Lazarus Group Deploys New Malware Targeting Blockchain Engineers

The North Korea-linked Lazarus APT group has been observed employing a novel weapon in their arsenal - the KandyKorn macOS malware. This insidious tool...

Study Reveals: People, Process and Technology Challenges Limit Organizations’ Ability to Prevent Attacks

Tenable, the Exposure Management company, recently unveiled a comprehensive study that unveils the obstacles faced by cybersecurity and IT leaders as they strive to...

Ukrainian Hackers Disrupt Russian Internet Services

Ukrainian hackers, known as the IT Army, executed a significant DDoS attack, disrupting Russian internet services in occupied territories. This article explores the attack's impact, recovery efforts, and the broader implications.

Why NIST included “Governance” in its CSF 2.0

The National Institute of Standards and Technology (NIST) has been at the forefront of promoting cybersecurity best practices and standards. One of its most...

Understanding Privilege Escalation in Information Security

Privilege escalation is one of the core concepts of information security. It refers to the type of attack where a user gains higher levels...

Latest news

- Advertisement -