NGX: Turkish arrays to challenge US mainstream storage vendors
23
Jan
2023

NGX: Turkish arrays to challenge US mainstream storage vendors

Turkish array maker NGX, which provide file and block access in its hardware, with cloud, software-defined storage and NVMe-over-fabrics is planning…

AWS patches bypass bug in CloudTrail API monitoring tool
23
Jan
2023

AWS patches bypass bug in CloudTrail API monitoring tool

Threat actors poking around AWS environments and API calls could stay under the radar Amazon Web Services (AWS) has patched…

India’s Public Education App Exposed Millions of Students’ Data
23
Jan
2023

India’s Public Education App Exposed Millions of Students’ Data

A security lapse in an app operated by India’s Education Ministry exposed the personally identifying information of millions of students…

23
Jan
2023

Trained developers get rid of more vulnerabilities than code scanning tools

An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations…

Samsung Galaxy Store App
23
Jan
2023

Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud

Jan 23, 2023Ravie LakshmananMobile Hacking / App Security Two security flaws have been disclosed in Samsung’s Galaxy Store app for…

23
Jan
2023

Australia Launches Global Task Force to Counter Ransomware

Australia has launched the International Counter Ransomware Task Force, a new initiative aimed at combatting ransomware attacks. The Task Force…

VASTFLUX campaign
23
Jan
2023

Hackers Exploiting Restricted in-app Environments

VASTFLUX, a large-scale well-organized, and sophisticated ad fraud operation were recently taken down by cybersecurity researchers at HUMAN Security Inc….

The U.S. ‘No Fly List’ Found On the Open Internet
23
Jan
2023

The U.S. ‘No Fly List’ Found On the Open Internet

The No Fly List and other sensitive files were discovered by Maia Arson Crimew, a Swiss security researcher and hacker,…

23
Jan
2023

Extent of reported CVEs overwhelms critical infrastructure asset owners

The sheer volume of reported ICS vulnerabilities and CVEs may cause critical infrastructure asset owners to feel overwhelmed, or need…

Silver C2 Framework
23
Jan
2023

Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks

Jan 23, 2023Ravie LakshmananThreat Detection / Infosec The legitimate command-and-control (C2) framework known as Sliver is gaining more traction from…

Cloud egress costs: What they are and how to dodge them
23
Jan
2023

Cloud egress costs: What they are and how to dodge them

The cloud’s pay-as-you-go model offers flexibility and an easy way to expand data storage. But, although most cloud providers allow…

ransom data leak Puma
23
Jan
2023

Ransomware Gangs Leak Data Despite Ransom Payments

A cybercriminal named LeakBase has claimed to have added Puma’s database to a hacker forum. The database is allegedly from…