A Conversation With Rinki Sethi, CISO Of BILL
12
Jun
2024

A Conversation With Rinki Sethi, CISO Of BILL

12 Jun Women In Cybersecurity: A Conversation With Rinki Sethi, CISO Of BILL Posted at 08:49h in Blogs by Di…

Black Basta Ransomware
12
Jun
2024

Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw

Jun 12, 2024NewsroomRansomware / Endpoint Security Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed…

CMA working paper outlines concerns about Microsoft’s competitive hold on UK cloud market
12
Jun
2024

CMA working paper outlines concerns about Microsoft’s competitive hold on UK cloud market

The interim findings of the Competition and Markets Authority’s (CMA’s) investigation into Microsoft’s cloud software licensing strategy should be a…

Prototype Pollution and XSS-DOM Vulnerability
12
Jun
2024

Dark Web Hacker Advertises XSS-DOM Risks In Google Subdomains

A dark web hacker that goes by the name “Tombstone” has claimed and advertised multiple vulnerabilities affecting a subdomain affiliated with…

Windows
12
Jun
2024

Black Basta ransomware gang linked to Windows zero-day attacks

The Black Basta ransomware operation is suspected of exploiting a Windows privilege escalation vulnerability (CVE-2024-26169) as a zero-day before a…

Black Basta Actors Exploited Windows Zero-day Privilege Escalation Vulnerability
12
Jun
2024

Black Basta Actors Exploited Windows 0day Privilege Vulnerability

The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched…

Ticketmaster-Snowflake Breach
12
Jun
2024

Lessons from the Ticketmaster-Snowflake Breach

Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from…

How to ensure public cloud services are used safely and securely
12
Jun
2024

How to ensure public cloud services are used safely and securely

By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data…

MEDUSA Ransomware Group
12
Jun
2024

MEDUSA Ransomware Group Demands Millions In Ransom

The MEDUSA ransomware group has reared its ugly head again and this time it has claimed to have targeted three…

JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens
12
Jun
2024

JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens

JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens Pierluigi Paganini June 12, 2024 JetBrains warned to fix a critical…

20,000 FortiGate appliances compromised by Chinese hackers
12
Jun
2024

20,000 FortiGate appliances compromised by Chinese hackers

Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on…

CISA Urges Administrators To Review Newly Released Six ICS Advisories
12
Jun
2024

CISA Urges Administrators To Review Released Six ICS Advisories

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review…