Threat Actors Exploiting SMBs Using List of Popular Productivity Tools
29
Jul
2024

Threat Actors Exploiting SMBs Using List of Popular Productivity Tools

Due to their widespread use, popular productivity tools are often targeted and attacked by hackers. These tools create a large…

Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics
29
Jul
2024

Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics

Long-distance internet cables in France have been cut in an act of sabotage, causing disruption to internet services across the…

Securing India’s Move To The Cloud
29
Jul
2024

Securing India’s Move To The Cloud

29 Jul Securing India’s Move To The Cloud Posted at 08:59h in Blogs by Di Freeze This week in cybersecurity…

Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)
29
Jul
2024

Critical Acronis Cyber Infrastructure vulnerability exploited in the wild (CVE-2023-45249)

CVE-2023-45249, a critical vulnerability affecting older versions of Acronis Cyber Infrastructure, is being exploited by attackers. About Acronis Cyber Infrastructure…

Frost Radar Recognizes Cyble As A Top Performer In CTI
29
Jul
2024

Frost Radar Recognizes Cyble As A Top Performer In CTI

Atlanta, GA – July 26, 2024 – Cyble, a leading cyber threat intelligence 2024 provider, has been named the Leader…

Operation ShadowCat Using Weaponized Office document To Attack Users In India
29
Jul
2024

Operation ShadowCat Using Weaponized Office document To Attack Users In India

Researchers identified a new attack campaign (“Operation ShadowCat”) using malicious LNK files distributed via spam emails, which triggers a PowerShell…

How Infostealers Pillaged the World’s Passwords
29
Jul
2024

How Infostealers Pillaged the World’s Passwords

These platforms take cues in how they are designed and marketed from legitimate information and ecommerce services. Many markets and…

Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability
29
Jul
2024

Cisco Patches the Products Impacted by RADIUS Protocol Vulnerability

Cisco has issued patches for multiple products affected by a critical vulnerability in the RADIUS protocol. The vulnerability, identified as…

The Other Lesson from the XZ Utils Supply-Chain Attack
29
Jul
2024

The Other Lesson from the XZ Utils Supply-Chain Attack

“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in…

Data Security Game
29
Jul
2024

How Searchable Encryption Changes the Data Security Game

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…

Telecommuncations CISO
29
Jul
2024

Threat Intelligence In Telecommunication: CISO’s Lifeline

The telecommunications industry stands at the crossroads of innovation and vulnerability. As one of the backbone industries of digital economies,…

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems
29
Jul
2024

Threat Actors Using OS Command Injection Vulnerabilities To Compromise Systems

By exploiting OS command injection vulnerabilities, threat actors can run arbitrary commands on a host operating system to obtain unauthorized…