Evil hacker
30
Aug
2024

New Voldemort malware abuses Google Sheets to store stolen data

A new malware campaign is spreading a previously undocumented backdoor named “Voldemort” to organizations worldwide, impersonating tax agencies from the…

Making Progress and Losing Ground
30
Aug
2024

Making Progress and Losing Ground

As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The…

Jane Devry
30
Aug
2024

Seven Deadly Myths of DDoS Protection

Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people…

WhatsApp logo
30
Aug
2024

Iranian cybercriminals are targeting WhatsApp users in spear phishing campaign

An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season…

APT-C-60
30
Aug
2024

APT-C-60 Exploits WPS Office Zero-Day

A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…

Iranian Hackers Attacking US Organizations To Deploy Ransomware
30
Aug
2024

Iranian Hackers Attacking US Organizations To Deploy Ransomware

As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors…

Naveen Goud
30
Aug
2024

Durex data breach leaks sensitive details of customers

Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking…

Atlassian Confluence Vulnerability
30
Aug
2024

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…

Hackers Delivers Lumma Stealer Via Public GitHub Commands
30
Aug
2024

Hackers Delivers Lumma Stealer Via Public GitHub Commands

Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform…

Innovator Spotlight: SNYK
30
Aug
2024

Innovator Spotlight: SNYK – Cyber Defense Magazine

It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…

Snake Keylogger Attack Windows Using Weaponized Excel Doc
30
Aug
2024

Snake Keylogger Attack Windows Using Weaponized Excel Doc

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…