PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 
15
Dec
2024

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms 

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms  Pierluigi Paganini December 15, 2024 Researchers discovered PUMAKIT, a Linux rootkit…

Jane Devry
15
Dec
2024

Auguria Unveils Upgraded Security Knowledge Layer Platform at Black Hat Europe 2024

Auguria, Inc., a leader in AI-driven security operations solutions, has introduced the latest enhancements to its Security Knowledge Layer™ Platform….

Weekly Cyber Security News Recap
15
Dec
2024

Data Breach, Vulnerabilities & Cyber Attack & Other News

Welcome to this week’s Cyber Security Newsletter, where we delve into the latest developments and crucial updates in cybersecurity. Your…

Beyond Encryption: Advancing Data-in-Use Protection
15
Dec
2024

Beyond Encryption: Advancing Data-in-Use Protection

In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity…

Curl Vulnerability Attackers Sensitive Information
15
Dec
2024

Curl Vulnerability Let Attackers Access Sensitive Information

A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive…

The Simple Math Behind Public Key Cryptography
15
Dec
2024

The Simple Math Behind Public Key Cryptography

The original version of this story appeared in Quanta Magazine. For thousands of years, if you wanted to send a…

Jane Devry
15
Dec
2024

Securing Against Shopping Scams: Cybersecurity Risks to Avoid During the Holidays

The holiday season is largely characterized by a significant rise in consumer spending, and digital deals for Black Friday and…

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael
15
Dec
2024

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael

IOCONTROL cyberweapon used to target infrastructure in the US and Isreael Pierluigi Paganini December 14, 2024 Iran-linked threat actors target…

Russian cyberspies target Android users with new spyware
14
Dec
2024

Russian cyberspies target Android users with new spyware

Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal…

Hacker
14
Dec
2024

390,000 WordPress accounts stolen from hackers in supply chain attack

A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog
14
Dec
2024

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 14, 2024 U.S….

A complete guide to finding advanced file upload vulnerabilities
14
Dec
2024

A complete guide to finding advanced file upload vulnerabilities

File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…