Hackerone logo
10
Dec
2024

New Guidance for Federal AI Procurement Embraces Red Teaming and Other HackerOne Suggestions

Earlier this year, the Office of Management and Budget (OMB), which establishes budget rules for federal agencies, issued a memorandum…

Phishing header
10
Dec
2024

Uncovering an advanced phishing attack

This article is written by Varonis Security Specialist Tom Barnea. Think about your most recent security awareness training concerning phishing…

Visual Studio Code Tunnels
10
Dec
2024

Chinese Hackers Using Visual Studio Code Tunnels & RDP To Gain Remote Access

In a sophisticated cyber-espionage campaign dubbed ‘Operation Digital Eye,’ suspected Chinese state-backed hackers targeted major business-to-business IT service providers across…

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera
10
Dec
2024

ETSI Security Conference 2024 – Post-Quantum Cryptography w/ Daniele Lacamera

Daniele Lacamera is a software technologist and researcher. He is an expert in operating systems and TCP/IP, with more than 20…

Versa Endpoint DLP prevents data exfiltration
10
Dec
2024

Versa Endpoint DLP prevents data exfiltration

Versa announced Versa Endpoint DLP, an integrated endpoint data loss prevention (DLP) capability delivered by the Versa SASE Client as…

Hacker looking at a box
10
Dec
2024

New Cleo zero-day RCE flaw exploited in data theft attacks

Hackers are actively exploiting a zero-day vulnerability in Cleo managed file transfer software to breach corporate networks and conduct data…

SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files
10
Dec
2024

SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files

SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within…

Visual Studio Tunnels Abused For Stealthy Remote Access
10
Dec
2024

Visual Studio Tunnels Abused For Stealthy Remote Access

In an attack campaign dubbed “Operation Digital Eye,” a suspected China-nexus threat actor has been observed targeting business-to-business IT service…

Hackers Target Job Seekers with Banking Trojan Using Fake Job Emails
10
Dec
2024

Hackers Target Job Seekers with Banking Trojan Using Fake Job Emails

SUMMARY AppLite Trojan: A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive…

Stamus Networks Clear NDR uncovers unauthorized activity
10
Dec
2024

Stamus Networks Clear NDR uncovers unauthorized activity

Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious…

Mobile Phishing Campaign
10
Dec
2024

Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam

Dec 10, 2024Ravie LakshmananMobile Security / Cryptocurrency Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign…

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
10
Dec
2024

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

An ongoing RedLine info-stealer effort targets Russian-speaking entrepreneurs using unlicensed corporate software copies to automate business operations. Attackers were distributing…