Qilin ransomware now steals credentials from Chrome browsers
23
Aug
2024

Qilin ransomware now steals credentials from Chrome browsers

The Qilin ransomware group has been using a new tactic and deploys a custom stealer to steal account credentials stored in…

Innovator Spotlight: ExtraHop
23
Aug
2024

Innovator Spotlight: ExtraHop – Cyber Defense Magazine

As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and…

Innovator Spotlight: Normalyze
23
Aug
2024

Innovator Spotlight: Normalyze – Cyber Defense Magazine

In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem,…

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
23
Aug
2024

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals

INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing…

Mike Lynch, acquitted in US trial and found dead at sea, was British tech trailblazer
23
Aug
2024

Mike Lynch, acquitted in US trial and found dead at sea, was British tech trailblazer – Software

Mike Lynch, the tech tycoon who died when his luxury yacht sank off Sicily, spent more than a decade building…

Innovator Spotlight: Harmonic Security
23
Aug
2024

Innovator Spotlight: Harmonic Security – Cyber Defense Magazine

The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in…

Innovator Spotlight: Upwind
23
Aug
2024

Innovator Spotlight: Upwind – Cyber Defense Magazine

The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022,…

Google to help build cyber protection for Australian infrastructure
22
Aug
2024

Google to help build cyber protection for Australian infrastructure – Security

Google and Australia’s national science agency CSIRO will join hands to develop digital tools that automatically detect and fix software…

Innovator Spotlight: AppSOC
22
Aug
2024

Innovator Spotlight: AppSOC – Cyber Defense Magazine

The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security…

New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
22
Aug
2024

New Qilin tactics a ‘bonus multiplier’ for ransomware chaos

The cyber criminal Qilin ransomware gang seems to be upping the stakes in its ransomware attacks, stealing not just their…

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog
22
Aug
2024

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog Pierluigi…

Hardcoded Credential Vulnerability
22
Aug
2024

Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk

Aug 22, 2024Ravie LakshmananVulnerability / Network Security SolarWinds has issued patches to address a new security flaw in its Web…