WhatsApp logo
30
Aug
2024

Iranian cybercriminals are targeting WhatsApp users in spear phishing campaign

An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season…

APT-C-60
30
Aug
2024

APT-C-60 Exploits WPS Office Zero-Day

A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in…

Evolution of Attack Surface Management
30
Aug
2024

Evolution of Attack Surface Management

The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…

Iranian Hackers Attacking US Organizations To Deploy Ransomware
30
Aug
2024

Iranian Hackers Attacking US Organizations To Deploy Ransomware

As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors…

Naveen Goud
30
Aug
2024

Durex data breach leaks sensitive details of customers

Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking…

Atlassian Confluence Vulnerability
30
Aug
2024

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…

Hackers Delivers Lumma Stealer Via Public GitHub Commands
30
Aug
2024

Hackers Delivers Lumma Stealer Via Public GitHub Commands

Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform…

Innovator Spotlight: SNYK
30
Aug
2024

Innovator Spotlight: SNYK – Cyber Defense Magazine

It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…

Snake Keylogger Attack Windows Using Weaponized Excel Doc
30
Aug
2024

Snake Keylogger Attack Windows Using Weaponized Excel Doc

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…

Publishers Spotlight: Blumira
30
Aug
2024

Publishers Spotlight: Blumira – Cyber Defense Magazine

I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional…

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users
30
Aug
2024

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the…

Hackerone logo
30
Aug
2024

How Hai Facilitates Clear and Effective Communication

The Communication Challenge in Cybersecurity The vulnerability management process involves various stakeholders, each with their own expertise and communication styles….