ANY.RUN Malware Sandbox with Splunk
18
Sep
2024

SOC Analysts Can Now Use ANY.RUN Malware Sandbox with Splunk

Splunk users can now leverage ANY.RUN’s sandbox and threat intelligence directly within their Splunk SOAR environment. This allows for the…

Walkie-Talkies Explode in New Attack on Hezbollah
18
Sep
2024

Walkie-Talkies Explode in New Attack on Hezbollah

With Hezbollah and Lebanon still reeling from a coordinated wave of pager explosions on Tuesday that killed at least 12…

Naveen Goud
18
Sep
2024

Rising Threat of Ransomware Targeting Cloud Services

In a concerning development within the cybersecurity landscape, ransomware operators have adopted a novel approach to infiltrating networks by focusing…

Ghost Cybercrime Platform Dismantled, Admin Charged
18
Sep
2024

Ghost Cybercrime Platform Dismantled, Admin Charged

Law enforcement agencies have successfully dismantled “Ghost,” a sophisticated encrypted communication platform allegedly designed exclusively for criminal use. The operation,…

Database Misconfiguration at Fuel Industry Software Provider Exposed PII Data
18
Sep
2024

Server Misconfiguration at Fuel Industry Software Provider Exposes SSNs, PII Data

A server misconfiguration exposed a trove of documents belonging to FleetPanda, a leading petroleum and fuel industry software provider. Sensitive…

Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military
18
Sep
2024

Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military

A Chinese national has been indicted in the U.S. on charges of conducting a “multi-year” spear-phishing campaign to obtain unauthorized…

Workers and business leaders have different views on GenAI uses
18
Sep
2024

Workers and business leaders have different views on GenAI uses

Research from Experian and TechUK has found less than a third of employees are aware their employer is using generative…

What is Block Cipher?
18
Sep
2024

what is Block Cipher?

Block ciphers are a fundamental component of modern cryptography, crucial in securing data across various digital platforms. Unlike stream ciphers,…

The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity
18
Sep
2024

The Perils of Settling: Why ‘Good Enough’ Fails in Modern Cybersecurity

Introduction:  In an era where digital innovation advances rapidly and cyber threats evolve just as quickly, it is crucial for…

Hackers breaching construction firms via specialized accounting software
18
Sep
2024

Hackers breaching construction firms via specialized accounting software

Firms in the construction industry are getting breached by hackers via internet-exposed servers running Foundation accounting software, Huntress researchers are…

Credential Flusher, understanding the threat and how to protect your login data
18
Sep
2024

Credential Flusher, understanding the threat and how to protect your login data

Credential Flusher, understanding the threat and how to protect your login data Pierluigi Paganini September 18, 2024 Credential Flusher is…

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader
18
Sep
2024

UNC2970 Hackers Targeting Job Seekers with Weaponized PDF Files

Trojanized PDF readers are malicious software that are disguised as legitimate PDF viewing applications.  They are primarily used by the…