Multiple APT groups exploited WinRAR flaw CVE-2023-38831
19
Oct
2023

Multiple APT groups exploited WinRAR flaw CVE-2023-38831

Multiple APT groups exploited WinRAR flaw CVE-2023-38831 Pierluigi Paganini October 19, 2023 Google TAG reported that both Russia and China-linked…

SonicWall Vulnerabilities
19
Oct
2023

Hackers Using Secure USB Drives to Attack Government Entities

An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device…

19
Oct
2023

The must-knows about low-code/no-code platforms

The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that…

Microsoft pitches glass as eternal storage medium
19
Oct
2023

Microsoft pitches glass as eternal storage medium – Cloud – Hardware

Microsoft has been experimenting with glass as a data storage medium for some years, and is now pivoting that research…

19
Oct
2023

Reinforcing cybersecurity: The network’s role to prevent, detect, and respond to attacks

It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every…

3 crucial security steps people should do, but don't
19
Oct
2023

3 crucial security steps people should do, but don’t

Cybersecurity could be as easy as 1-2-3. The problem, though, is that people have to want it. Cybersecurity could be…

WinRAR Flaw
19
Oct
2023

Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw

Oct 19, 2023NewsroomCyber Threat / Vulnerability A number of state-back threat actors from Russia and China have been observed exploiting…

19
Oct
2023

Cyber resilience starts in the C-suite

In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs…

Clever malvertising attack uses Punycode to look like KeePass
19
Oct
2023

Clever malvertising attack uses Punycode to look like KeePass’s official website

Threat actors are doubling down on brand impersonation by using lookalike domain names. Threat actors are known for impersonating popular…

19
Oct
2023

Business resilience becomes primary force behind cybersecurity investments

Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their…

Critical Citrix NetScaler bug needs more than patches
19
Oct
2023

Critical Citrix NetScaler bug needs more than patches – Security

The critical bug in some Citrix NetScaler products patched last week remains under exploitation, according to security researchers from Mandiant….

FBI Warns of Extortionists Stealing Plastic Surgery Data for Ransom
19
Oct
2023

FBI Warns of Extortionists Stealing Plastic Surgery Data for Ransom

The FBI also warns that cybercriminals are using this stolen data to extort victims, threatening to release it to the…