Roundcube Webmail
07
Aug
2024

Roundcube Webmail Flaws Allow Hackers to Steal Emails and Passwords

Aug 07, 2024Ravie LakshmananEmail Security / Vulnerability Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software…

Linux Kernel Exploit
07
Aug
2024

New Linux Kernel Exploit Technique ‘SLUBStick’ Discovered by Researchers

Aug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick…

Cyber security adoption is vital to Scotland’s space race
07
Aug
2024

Cyber security adoption is vital to Scotland’s space race

It has been described in various evocative ways across popular culture, reflecting its vastness and potential for discovery. But, as…

Nexera Crypto Hack
07
Aug
2024

Nexera Crypto Hacked, But Company Claims Only $440K Stolen

In yet another significant blow to the cryptocurrency ecosystem, blockchain platform Nexera has fallen victim to a major hack. While…

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings
07
Aug
2024

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings

A vulnerability in Microsoft 365’s anti-phishing measures allows malicious actors to deceive users into opening harmful emails by hiding the…

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic
07
Aug
2024

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic

Attackers, including nation-state actors, increasingly leverage legitimate cloud services for espionage operations, exploiting their low-profile and cost-effective nature.  The services,…

AWS Launches Mithra To Detect Malicious Domains Across Systems
07
Aug
2024

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…

What Employers and Tech Pros Are Looking For
07
Aug
2024

What Employers and Tech Pros Are Looking For

07 Aug Cybersecurity Certifications: What Employers and Tech Pros Are Looking For Posted at 09:03h in Blogs by Di Freeze…

CrowdStrike engages external experts, details causes of massive outage
07
Aug
2024

CrowdStrike engages external experts, details causes of massive outage

CrowdStrike has published a technical root cause analysis of what went wrong when a content update pushed to its Falcon…

RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials
07
Aug
2024

RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials

A newly surfaced cybercampaign targeting Israeli users has thrust the sophisticated RHADAMANTHYS information stealer into the spotlight. Originating from Russian-speaking…

Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
07
Aug
2024

Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection

Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants. A group of…

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
07
Aug
2024

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…