Cybercriminals exploit file sharing services to advance phishing attacks
20
Aug
2024

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or…

Blind Eagle Hackers
20
Aug
2024

Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America

Aug 20, 2024Ravie LakshmananMalware / Cyber Espionage Cybersecurity researchers have shed light on a threat actor known as Blind Eagle…

Palo Alto buoyed by cyber security demand
20
Aug
2024

Palo Alto buoyed by cyber security demand – Security

Palo Alto Networks forecast fiscal 2025 revenue and profit above Wall Street estimates, a sign of growing demand for its…

Strategies for security leaders: Building a positive cybersecurity culture
20
Aug
2024

Strategies for security leaders: Building a positive cybersecurity culture

Culture is a catalyst for security success. It can significantly reduce cybersecurity risks and boost cybersecurity resilience of any organization….

Oracle NetSuite Sites
20
Aug
2024

Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information

Aug 20, 2024Ravie LakshmananEnterprise Security / Data Breach Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle…

US says Iran cyber operations targeted Trump, Harris campaigns
20
Aug
2024

US says Iran cyber operations targeted Trump, Harris campaigns – Security

The United States has accused Iran of launching cyber operations against the campaigns of both US presidential candidates and targeting…

Windows 0-Day Downgrade Attack
20
Aug
2024

PoC Exploit Released for Windows 0-Day Downgrade Attack

A proof-of-concept (PoC) exploit has been publicly released for a pair of critical zero-day vulnerabilities in Microsoft Windows that enable…

AI for application security: Balancing automation with human oversight
20
Aug
2024

AI for application security: Balancing automation with human oversight

In this Help Net Security interview, Kyle Wickert, Worldwide Strategic Architect at AlgoSec, discusses the role of AI in application…

Lazarus hackers
20
Aug
2024

Windows driver zero-day exploited by Lazarus hackers to install rootkit

Image: Midjourney The notorious North Korean Lazarus hacking group exploited a zero-day flaw in the Windows AFD.sys driver to elevate privileges…

Organizations turn to biometrics to counter deepfakes
20
Aug
2024

Organizations turn to biometrics to counter deepfakes

The risk of deepfakes is rising with 47% of organizations having encountered a deepfake and 70% of them believing deepfake…

Azure Kubernetes Services Vulnerability Let Attackers Escalate Privileges
20
Aug
2024

Microsoft Azure Kubernetes Services Vulnerability Let Attackers Escalate Privileges

Mandiant recently disclosed a critical vulnerability in Microsoft Azure Kubernetes Services (AKS) that could have allowed attackers to escalate privileges…

Toyota
20
Aug
2024

Toyota confirms breach after stolen data leaks on hacking forum

Toyota confirmed that its network was breached after a threat actor leaked an archive of 240GB of data stolen from…