RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins
10
Dec
2024

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate,…

Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture
10
Dec
2024

Horizon3.ai NodeZero Insights enables executives to visualize changes in their security posture

Horizon3.ai launched NodeZero Insights, a platform designed for security leaders, CIOs, CISOs and practitioners. This new solution delivers real-time dashboards…

UK police continue to hold millions of custody images unlawfully
10
Dec
2024

UK police continue to hold millions of custody images unlawfully

Millions of unlawfully retained custody images could still be used for facial-recognition purposes by UK police, says biometric commissioner of…

VSCode
10
Dec
2024

Chinese hackers use Visual Studio Code tunnels for remote access

Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain…

HackerOne's Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards
10
Dec
2024

HackerOne’s Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards

10 Dec HackerOne’s Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards Posted at 08:40h in Blogs by Taylor…

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
10
Dec
2024

Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)

Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain…

Automated Internal and External Pentesting
10
Dec
2024

Automated Internal and External Pentesting

Dec 10, 2024The Hacker NewsVulnerability / Perimeter Security In today’s rapidly evolving threat landscape, safeguarding your organization against cyberattacks is…

Microsoft
10
Dec
2024

Microsoft 365 outage takes down Office web apps, admin center

Microsoft is investigating a widespread and ongoing Microsoft 365 outage impacting Office web apps and the Microsoft 365 admin center….

A CISO’s Guide to Managing Risk as the World Embraces AI
10
Dec
2024

A CISO’s Guide to Managing Risk as the World Embraces AI

As Generative AI becomes more deeply integrated into our digital landscape, organizations face a growing need to manage application, technology,…

How Red Teaming Helps Meet DORA Requirements
10
Dec
2024

How Red Teaming Helps Meet DORA Requirements

The Digital Operational Resilience Act (DORA) sets strict EU rules for financial institutions and IT providers, emphasizing strong cyber risk…

Visual Studio Code Remote Tunnels
10
Dec
2024

Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

Dec 10, 2024Ravie LakshmananCyber Espionage / Hacking News A suspected China-nexus cyber espionage group has been attributed to an attacks…

DWP ‘fairness analysis’ reveals bias in AI fraud detection system
10
Dec
2024

DWP ‘fairness analysis’ reveals bias in AI fraud detection system

An artificial intelligence (AI) system used by the Department for Work and Pensions (DWP) to detect welfare fraud is showing…