Bloody Wolf Attacking Organizations
05
Aug
2024

Bloody Wolf Attacking Organizations With $80 Malware From Underground Market

Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The…

World’s largest companies at near-universal risk of supply chain breach
05
Aug
2024

World’s largest companies at near-universal risk of supply chain breach

Out of the world’s 2,000 largest companies, 1,980 have a direct connection to a technology supplier that has experienced a…

mWise 2024
05
Aug
2024

Last chance for discount registration at Mandiant’s mWISE 2024

Register today for mWISE™, the unique cybersecurity conference from Mandiant, now part of Google Cloud. Built by practitioners for practitioners,…

Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)
05
Aug
2024

Critical Apache OFBiz pre-auth RCE flaw fixed, update ASAP! (CVE-2024-38856)

CVE-2024-38856, an incorrect authorization vulnerability affecting all but the latest version of Apache OFBiz, may be exploited by remote, unauthenticated…

Cyber Attacks
05
Aug
2024

Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks

Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence Organizations in Kazakhstan are the target of a threat activity cluster dubbed…

Threat Actor Allegedly Claims Leak of SisaCloud Database
05
Aug
2024

Threat Actor Allegedly Claims Leak of SisaCloud Database

A threat actor has reportedly claimed responsibility for leaking a database belonging to SisaCloud, Thailand’s School Information System Advance. This…

Apple Unveils Homomorphic Encryption Package for Secure Cloud Computing
05
Aug
2024

Apple Unveils Homomorphic Encryption Package for Secure Cloud Computing

Apple’s open-source “swift-homomorphic-encryption” package revolutionizes privacy in cloud computing. It allows computations on encrypted data without decryption, safeguarding user information….

18 Types of Cyberattacks & Prevention Methods
05
Aug
2024

18 Types of Cyberattacks & Prevention Methods

05 Aug Cybersecurity Deep-Dive: 18 Types of Cyberattacks & Prevention Methods Posted at 08:53h in Blogs by Di Freeze This…

Smart App Control and SmartScreen
05
Aug
2024

Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have uncovered design weaknesses in Microsoft’s Windows Smart App Control and…

Keytronic incurred approximately $17 million of expenses following ransomware attack
05
Aug
2024

Keytronic incurred approximately $17 million of expenses following ransomware attack

Keytronic incurred approximately $17 million of expenses following ransomware attack Pierluigi Paganini August 05, 2024 Printed circuit board assembly (PCBA)…

whos-minding-the-store-why-operational-technology-security-has-become-a-top-priority-for-federal-security-leaders
05
Aug
2024

Who’s Minding the Store? Why Operational Technology Security Has Become a Top Priority for Federal Security Leaders

The Federal OT footprint – from military base operations to their public utilities, from postal operations to NASA missions –…

New LianSpy Attacking Android Users to Steal Sensitive Data
05
Aug
2024

New LianSpy Attacking Android Users to Steal Sensitive Data

Cybersecurity experts have uncovered a sophisticated Android spyware, LianSpy, targeting users to steal sensitive data. This spyware employs advanced evasion…