Smiley
16
May
2023

Open-source Cobalt Strike port ‘Geacon’ used in macOS attacks

Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more…

CERT-In Issues Alert on Vulnerabilities in VMware, Patches Issued
16
May
2023

CERT-In Alert On Four Vulnerabilities In VMware, Patch Issued

The Indian Computer Emergency Response Team (CERT-IN) has issued an alert on vulnerabilities in VMware Aria Operations. Versions of VMware…

h1-2006 CTF | HackerOne
16
May
2023

Introducing My Programs | HackerOne

In December 2018 we released Hacker Dashboard, the central place for all your hacker related activities. Thanks to the community,…

The Future is (Cyber) Mindful
16
May
2023

The Future is (Cyber) Mindful

In cybersecurity, a vulnerability is a weakness. It’s a bad thing. Defences must be strong, unbreakable, and hardened against threats…

Automation: The key to FinOps success
16
May
2023

Automation: The key to FinOps success

Strong demand for cloud services continues to drive growth in IT spending this year, despite inflationary pressures, says Stephen Minton,…

Dating Apps And Sites: Mitigating Chargebacks In 2023
16
May
2023

Bank Syariah Indonesia Cyber Attack: LockBit Demands $20m Ransom

In what seems to be a negotiation failure, the LockBit ransomware group decided to go ahead and leak the data…

The service desk as an attack vector
16
May
2023

The service desk as an attack vector

“So you work in service desk? Must be soul-killing to ask people to turn their computers off and on again…

Discord Suffers Data Breach Through Compromised Third Party
16
May
2023

Discord Suffers Data Breach Through Compromised Third Party

Popular social media platform Discord has notified users it has suffered a data breach after a support agent’s account at…

16
May
2023

Lacroix manufacturing facilities shut down following cyberattack

French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company…

Why we need a secure side door for encrypted apps, not a back door  
16
May
2023

Why we need a secure side door for encrypted apps, not a back door  

There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish “back doors”…

Revealing The Top 50 CISOs To Watch In 2023
16
May
2023

Revealing The Top 50 CISOs To Watch In 2023

In today’s interconnected digital landscape, the role of Chief Information Security Officers (CISOs) has continued to evolve as these dedicated…

BPFDoor Targeting Linux Systems
16
May
2023

New Stealthy Backdoor Malware Targets Linux Systems

A completely new and previously unreported form of BPFdoor was recently discovered and examined by Deep Instinct’s threat lab. The…