Jane Devry
15
Aug
2024

Cryptography: A Forgotten Part of Software Supply Chain Security

Securing the software supply chain has become a top priority due to high-profile breaches and increasing regulatory scrutiny. International agencies…

Cybercrime Magazine Heads To Fire Island For The Day
15
Aug
2024

Cybercrime Magazine Heads To Fire Island For The Day

15 Aug Cybercrime Magazine Heads To Fire Island For The Day Posted at 09:21h in Blogs by Di Freeze This…

New Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups
15
Aug
2024

Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups

A recent Digital Forensics and Incident Response (DFIR) report has uncovered various sophisticated tools threat actors employ to bypass major…

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
15
Aug
2024

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

Google’s flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running…

Choosing Security: Why Companies Should Reject Ransom Payments
15
Aug
2024

Choosing Security: Why Companies Should Reject Ransom Payments

With ransomware attacks reaching unprecedented levels, businesses face tough decisions when their data is held hostage. While the temptation to…

Time to explore the Digital Operational Resilience Act (DORA)
15
Aug
2024

Time to explore the Digital Operational Resilience Act (DORA)

Today, ICT-related incidents remain rampant, with the scourge of data breaches showing no sign of abating. This year,millions of records will unfortunately once again be affected with the ramifications being severe and the average…

European NGOs and Media
15
Aug
2024

Russian-Linked Hackers Target Eastern European NGOs and Media

Aug 15, 2024Ravie LakshmananCyber Attack / Social Engineering Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations…

Hacking GitHub Repositories Via Race Condition That leads To Remote Code Execution
15
Aug
2024

GitHub Vulnerability “ArtiPACKED” Trigger RCE Exploit to Hack Repositories

The research identifies a critical security vulnerability in GitHub Actions artifacts, enabling unauthorized access to tokens and secrets within CI/CD…

EDR-Killing Tool
15
Aug
2024

RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks

Aug 15, 2024Ravie LakshmananRansomware / Cybercrime A cybercrime group with links to the RansomHub ransomware has been observed using a…

'Blackswans' take flight: the legal ramifications of the CrowdStrike incident  
15
Aug
2024

‘Blackswans’ take flight: the legal ramifications of the CrowdStrike incident  

Public admission of failure takes courage. In trying to limit reputational damage to his cybersecurity company, CrowdStrike president Michael Sentonas…

Rivers Of Phish - New Phishing Campaign Attacks Russia Enemies Globally
15
Aug
2024

Rivers Of Phish – New Phishing Campaign Attacks Russia Enemies Globally

In collaboration with Access Now and other civil society organizations, Citizen Lab exposed a sophisticated attack dubbed as “Rivers of…

Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
15
Aug
2024

Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)

SolarWinds has fixed a critical vulnerability (CVE-2024-28986) in its Web Help Desk (WHD) solution that may allow attackers to run…