Hackers Delivers Lumma Stealer Via Public GitHub Commands
30
Aug
2024

Hackers Delivers Lumma Stealer Via Public GitHub Commands

Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform…

Innovator Spotlight: SNYK
30
Aug
2024

Innovator Spotlight: SNYK – Cyber Defense Magazine

It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…

Snake Keylogger Attack Windows Using Weaponized Excel Doc
30
Aug
2024

Snake Keylogger Attack Windows Using Weaponized Excel Doc

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…

Publishers Spotlight: Blumira
30
Aug
2024

Publishers Spotlight: Blumira – Cyber Defense Magazine

I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional…

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users
30
Aug
2024

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the…

Hackerone logo
30
Aug
2024

How Hai Facilitates Clear and Effective Communication

The Communication Challenge in Cybersecurity The vulnerability management process involves various stakeholders, each with their own expertise and communication styles….

Censored mouth
30
Aug
2024

Researcher sued for sharing data stolen by ransomware with media

The City of Columbus, Ohio, has filed a lawsuit against security researcher David Leroy Ross, aka Connor Goodwolf, accusing him…

Malware Obfuscation
30
Aug
2024

Malware Obfuscation Techniques – A Complete Guide

In the ever-evolving landscape of cybersecurity, malware obfuscation techniques are advancing rapidly. As security measures improve, so do malicious actors’…

INE Security Named 2024 SC Awards Finalist
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a…

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign
30
Aug
2024

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected…

WhatsUp Gold Vulnerability (CVE-2024-4885)
30
Aug
2024

Critical CVE-2024-4885 Flaw In WhatsUp Gold Exposes Systems

Recent security findings reveal that Progress Software’s WhatsUp Gold, a prominent enterprise network monitoring and management solution, harbors significant vulnerabilities…

INE Security Named 2024 SC Awards Finalist
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a…