LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

Defaulting to open: Decoding the (very public) CrowdStrike event
27
Sep
2024

Defaulting to open: Decoding the (very public) CrowdStrike event

We live in an era of cyber ‘incidents,’ from WannaCry to MOVEit. However, it’s undeniably rare that a vendor finds…

CUPS flaws allow remote code execution on Linux systems under certain conditions
27
Sep
2024

CUPS flaws allow remote code execution on Linux systems under certain conditions

CUPS flaws allow remote code execution on Linux systems under certain conditions Pierluigi Paganini September 27, 2024 A researcher has…

Embargo ransomware escalates attacks to cloud environments
27
Sep
2024

Embargo ransomware escalates attacks to cloud environments

Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strategy…

Top 5 SME Cybersecurity Mistakes & Solutions in 2024
27
Sep
2024

Top 5 SME Cybersecurity Mistakes & Solutions in 2024

Many small to medium-sized enterprises (SMEs) misperceive cybersecurity as an IT issue for technical specialists. By recognizing organizational protection as…

Innovator Spotlight: Zilla Security
27
Sep
2024

Innovator Spotlight: Zilla Security – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with…

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page
27
Sep
2024

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page

Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…

innovator-spotlight-guardio
27
Sep
2024

Innovator Spotlight: Guardio – Cyber Defense Magazine

Cyber threats are becoming more sophisticated, putting both individuals and businesses at significant risk. The rise in phishing attacks, identity…

Printing vulnerability affecting Linux distros raises alarm
27
Sep
2024

Printing vulnerability affecting Linux distros raises alarm

A newly discovered series of four dangerous flaws in the Common Unix Printing System (Cups), which is used across virtually…

Hackers Break Into OpenAI Newsroom X Account For Crypto Scam
27
Sep
2024

Hackers Break Into OpenAI Newsroom X Account For Crypto Scam

Hackers compromised OpenAI’s official press account on X, a platform used for product and policy announcements. The attackers posted a…

What is Authentication? – Types, Role & How it Works!
27
Sep
2024

What is Authentication?Types, Roles & How it Works!

Authentication is a cornerstone of digital security, serving as the first defense against unauthorized access to sensitive information and systems….

Breaking free from hackers: Can air gapping protect corporate data?
27
Sep
2024

Breaking free from hackers: Can air gapping protect corporate data?

A recent Cyber Security Breaches Survey revealed that approximately 22% of UK businesses and 14% of charities had experienced cybercrimes in the last 12…