Supply Chains Make Insider Threat Defense More Complex
27
Nov
2024

Supply Chains Make Insider Threat Defense More Complex

Regular insider threats are bad enough — conventional security tools don’t detect them, they know where it’ll hurt to hit,…

In the cloud, effective IAM should align to zero-trust principles
27
Nov
2024

In the cloud, effective IAM should align to zero-trust principles

In today’s digital landscape, the traditional security perimeter has dissolved, making identity the new frontline of defence. As organisations increasingly…

Hackers Exploiting ProjectSend Authentication Vulnerability In The Wild
27
Nov
2024

Hackers Exploiting ProjectSend Authentication Vulnerability In The Wild

Hackers are actively exploiting a critical authentication vulnerability in ProjectSend, a popular open-source file-sharing web application. The vulnerability, now identified…

INTERPOL Arrests 1,000 and Dismantles Cybercrime Networks Across Africa
27
Nov
2024

INTERPOL Arrests 1,000 and Dismantles Cybercrime Networks Across Africa

Group-IB collaborated with INTERPOL and AFRIPO in a major crackdown on cybercrime in Africa for “Operation Serengeti.” This article provides…

Exploits Corrupted Files
27
Nov
2024

Zero-Day Attack Exploits Corrupted Files to Evade Advanced Security Tools

Cybersecurity experts at ANY.RUN have uncovered an active zero-day attack campaign that leverages corrupted files to bypass antivirus software, sandbox…

Philippine Entrepreneur Combines Blockchain Innovation with Environmental Conservation through Ora Coin Foundation
27
Nov
2024

Philippine Entrepreneur Combines Blockchain Innovation with Environmental Conservation through Ora Coin Foundation

Cebu, Philippines, November 27th, 2024, CyberNewsWire Cebu-based entrepreneur Brian Christopher Aguilar has emerged as a notable figure in the cryptocurrency…

SpyGlace Backdoor
27
Nov
2024

APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor

Nov 27, 2024Ravie LakshmananMalware / Cyber Espionage The threat actor known as APT-C-60 has been linked to a cyber attack…

Barings Law plans to sue Microsoft and Google over AI training data
27
Nov
2024

Barings Law plans to sue Microsoft and Google over AI training data

A Manchester law firm has started on-boarding clients for a probable class action against Microsoft and Google, which it believes…

RomCom Exploits Firefox & Windows Zero-Day Vulnerabilities
27
Nov
2024

RomCom Exploits Firefox & Windows Zero-Day Vulnerabilities

A Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day…

Bootkitty, The First UEFI Bootkit Targeting Linux Servers
27
Nov
2024

Bootkitty, The First UEFI Bootkit Targeting Linux Servers

Researchers have uncovered the first UEFI bootkit designed specifically for Linux systems, named Bootkitty. This discovery marks a pivotal moment…

Dutch politicians raise concerns over Big Tech reliance
27
Nov
2024

Dutch politicians raise concerns over Big Tech reliance

Two Dutch political parties, GroenLinks-PvdA and NSC, have presented a detailed proposal advocating for a Dutch cloud infrastructure to prevent…

How DSPM Helps Businesses Meet Compliance Requirements
27
Nov
2024

How DSPM Helps Businesses Meet Compliance Requirements

How DSPM Helps Businesses Meet Compliance Requirements Pierluigi Paganini November 27, 2024 Data Security Posture Management (DSPM) helps monitor, secure,…