What secure coding practices mean to modern cyber security
17
Jul
2023

AI in cyber security: Distinguishing hype from reality

On the other hand, AI can also be a powerful tool within the hands of cyber security professionals, with many…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
17
Jul
2023

Exploitation of ColdFusion Vulnerability Reported as Adobe Patches Another Critical Flaw

Adobe on Friday announced patches for a critical-severity vulnerability in ColdFusion that could be exploited to achieve arbitrary code execution….

17
Jul
2023

Anonymous Sudan To Launch The PayPal Cyber Attack Soon After Test Attack

Anonymous Sudan announced that the hacktivist group launched a test attack against PayPal. The PayPal cyber attack lasted 30 seconds,…

17
Jul
2023

Usersec Joins Anonymous Russia To Launch Cyber Attack On France

In a concerning development, Usersec, a notorious hacker collective, has joined forces with the newly reactivated Anonymous Russia to carry…

A Russian national charged for committing LockBit Ransomware attacksSecurity Affairs
17
Jul
2023

Pompompurin, the BreachForums owner, pleads guilty to hacking charges and possession of child pornographySecurity Affairs

The owner of the BreachForums Conor Brian Fitzpatrick, aka Pompompurin, pleads guilty to hacking charges. The owner of the BreachForums…

Researchers released a PoC exploit for CVE-2023-20178 flaw in Cisco AnyConnect SecureSecurity Affairs
17
Jul
2023

Cisco fixed a critical flaw in SD-WAN vManageSecurity Affairs

Cisco warns of a critical unauthenticated REST API access vulnerability, tracked as CVE-2023-20214, impacting its SD-WAN vManage. Cisco addressed a…

How To Perform External  Black-box Penetration Testing in Organization with “ZERO” Information
17
Jul
2023

Black Box Penetration Testing – Complete Guide

Black Box Penetration Testing to the organization is from an external point of view and tests an external network with…

Data Exfiltration
17
Jul
2023

CERT-UA Uncovers Gamaredon’s Rapid Data Exfiltration Tactics Following Initial Compromise

Jul 17, 2023THNCyber Attack / Data Safety The Russia-linked threat actor known as Gamaredon has been observed conducting data exfiltration…

AI tool WormGPT used to launch Cyber Attacks
17
Jul
2023

AI tool WormGPT used to launch Cyber Attacks

According to a recent report by cybersecurity firm SlashNext, a newly developed AI tool called WormGPT is being employed by…

Enhancing Cybersecurity through Effective Cybersecurity Intelligence
17
Jul
2023

Enhancing Business Resilience: The Importance of Strong Threat Perception

In today’s ever-evolving digital landscape, businesses face an array of threats that can compromise their operations, reputation, and bottom line….

17
Jul
2023

CISOs under pressure: Protecting sensitive information in the age of high employee turnover

In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs,…

17
Jul
2023

Growing scam activity linked to social media and automation

The average number of scam resources created per brand across all regions and industries more than doubled year-on-year in 2022,…