Hackers Use Fake ESET Emails to Target Israeli Firms with Wiper Malware
19
Oct
2024

Hackers Use Fake ESET Emails to Target Israeli Firms with Wiper Malware

Hackers impersonate ESET in phishing attacks targeting Israeli organizations. Malicious emails, claiming to be from ESET, deliver wiper malware. Security…

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog
19
Oct
2024

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Veeam Backup and Replication flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 19, 2024 U.S. Cybersecurity…

Google Scholar and Sir Isaac Newton
19
Oct
2024

Google Scholar has a ‘verified email’ for Sir Isaac Newton

It’s true: Google Scholar profile of the renowned former physicist and polymath, Sir Isaac Newton bears a “verified email” note. According to Google…

North Korea-linked APT37 exploited IE zero-day in a recent attack
19
Oct
2024

North Korea-linked APT37 exploited IE zero-day in a recent attack

North Korea-linked APT37 exploited IE zero-day in a recent attack Pierluigi Paganini October 19, 2024 North Korea-linked group APT37 exploited…

Microsoft creates fake Azure tenants to pull phishers into honeypots
19
Oct
2024

Microsoft creates fake Azure tenants to pull phishers into honeypots

Microsoft is using deceptive tactics against phishing actors by spawning realistic-looking honeypot tenants with access to Azure and lure cybercriminals…

The Unsolvable Problem: XZ and Modern Infrastructure
19
Oct
2024

The Unsolvable Problem: XZ and Modern Infrastructure

The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…

Google Chrome’s uBlock Origin Purge Has Begun
19
Oct
2024

Google Chrome’s uBlock Origin Purge Has Begun

And that’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves….

Acronym Overdose
19
Oct
2024

Acronym Overdose – Navigating the Complex Data Security Landscape

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others….

Ransomware Attacks
19
Oct
2024

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor known as Crypt Ghouls has been linked to…

Omni Family Health data breach impacts 468,344 individuals
19
Oct
2024

Omni Family Health data breach impacts 468,344 individuals

Omni Family Health data breach impacts 468,344 individuals Pierluigi Paganini October 19, 2024 Omni Family Health disclosed a data breach…

Cisco Investigating Cyber Security Incident
19
Oct
2024

Cisco Investigating Cyber Security Incident, Takes DevHub Portal Offline

Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as…

The Disinformation Warning Coming From the Edge of Europe
19
Oct
2024

The Disinformation Warning Coming From the Edge of Europe

A TikTok video of actor Brian Baumgartner, from the American version of The Office, calling for the overthrow of the…