Hackers Actively Deploying Zyxel Firewall Flaw To Deploy Ransomware
29
Nov
2024

Hackers Actively Deploying Zyxel Firewall Flaw To Deploy Ransomware

Cybersecurity experts have uncovered a wave of attacks exploiting vulnerabilities in Zyxel firewall to deploy the Helldown ransomware. This new…

Zyxel Firewall Vulnerability Actively Exploited in Attacks
29
Nov
2024

Zyxel Firewall Vulnerability Actively Exploited in Attacks

Zyxel has announced awareness of active exploitation attempts by threat actors targeting their firewall products. This follows a detailed report…

Jane Devry
29
Nov
2024

HawkEye Malware: Technical Analysis – Cybersecurity Insiders

HawkEye, also known as PredatorPain (Predator Pain), is a malware categorized as a keylogger, but over the years, it has…

Spying on Behalf of China
29
Nov
2024

U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency

Nov 29, 2024Ravie LakshmananCorporate Espionage / National Security A 59-year-old U.S. citizen who immigrated from the People’s Republic of China…

Black Friday? How Counterfeiters Hijack E-Commerce Deals
29
Nov
2024

Black Friday? How Counterfeiters Hijack E-Commerce Deals

The global e-commerce boom has brought unparalleled convenience for consumers and massive revenue streams for businesses. Yet, this growth has…

UK Healthcare Provider Suffered Cyberattack, Services Affected
29
Nov
2024

UK Healthcare Provider Suffered Cyberattack, Services Affected

A major cyberattack has disrupted operations at Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, leading to…

Naveen Goud
29
Nov
2024

Ransomware spreading through Microsoft Teams

Black Basta ransomware, a notorious cybercrime group, has recently resurfaced in the news for its new and alarming method of…

The effect of compliance requirements on vulnerability management strategies
29
Nov
2024

The effect of compliance requirements on vulnerability management strategies

In this Help Net Security interview, Steve Carter, CEO of Nucleus Security, discusses the ongoing challenges in vulnerability management, including…

AI-based tools designed for criminal activity are in high demand
29
Nov
2024

AI-based tools designed for criminal activity are in high demand

Multiple regional conflicts, such as Russia’s continued invasion of Ukraine and the Israel-Hamas conflict, have resulted in a surge in…

Active Directory Certificate Services Vulnerability
29
Nov
2024

Active Directory Certificate Services Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in Microsoft’s Active Directory Certificate Services (AD CS) that could allow attackers to escalate privileges and potentially…

Infosec products of the month: November 2024
29
Nov
2024

Infosec products of the month: November 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Absolute, Arkose Labs, Atakama, BlackFog,…

Jane Devry
29
Nov
2024

Protecting Against Inevitable Insider Threats

The seven pillars of the Department of Defense (DOD) Zero Trust Reference Architecture provide a comprehensive framework for securing today’s…