Unlocking the Power of Behavioral Cloud Native Threat Detection and Response
27
Jul
2024

Unlocking the Power of Behavioral Cloud Native Threat Detection and Response

Behavioral detection and response is not a new concept, and the top three detection and response players command a combined…

3,000 Fake GitHub Accounts Used to Spread Malware in Stargazers Ghost Scheme
27
Jul
2024

3,000 Fake GitHub Accounts Used to Spread Malware in Stargazers Ghost Scheme

Cybercriminals are using GitHub to distribute malware through fake accounts. Learn how the “Stargazers Ghost” network operates and how to…

CERT-In Alerts Of Phishing Attack Targeting CrowdStrike Users
27
Jul
2024

CERT-In Alerts Of Phishing Attack Targeting CrowdStrike Users

The Indian Computer Emergency Response Team (CERT-In) has issued a warning about an ongoing phishing campaign that is exploiting a…

IIT Kanpur And NPTI Partner For Power Grid Cybersecurity
27
Jul
2024

IIT Kanpur And NPTI Partner For Power Grid Cybersecurity

The Indian Institute of Technology, Kanpur (IITK), and the National Power Training Institute (NPTI) have signed a Memorandum of Understanding…

Gemini Data Breach Highlights Risks In Crypto Industry
27
Jul
2024

Gemini Data Breach Highlights Risks In Crypto Industry

Cryptocurrency exchange Gemini has disclosed a data breach incident that occurred due to a cyberattack on its Automated Clearing House…

FBCS Data Breach Victims Surge To 4.2 Million
27
Jul
2024

FBCS Data Breach Victims Surge To 4.2 Million

Debt collection agency Financial Business and Consumer Solutions (FBCS) has revealed that the number of people impacted by the data…

Two-Step Phishing Attacks
27
Jul
2024

Hackers Use Microsoft Forms for Two-Step Phishing Attacks

Cybercriminals are increasingly using Microsoft Office Forms to launch sophisticated two-step phishing attacks. At present, certain individuals are being tricked…

How To Fix Google Chrome Browser Password Manager Issue
27
Jul
2024

How To Fix Google Chrome Browser Password Manager Issue

Google has successfully resolved a significant issue affecting the Chrome Browser password manager, which left a substantial number of users…

Threat Actors Exploiting Selenium Grid Services For Cryptomining
27
Jul
2024

Threat Actors Exploiting Selenium Grid Services For Cryptomining

Threat actors often exploit the cloud services for cryptomining, as doing so allows them to abuse the huge computational resources…

PlugX Malware
27
Jul
2024

French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to…

How GenAI Can Be A CISO's Best Friend And Worst Enemy
27
Jul
2024

How GenAI Can Be A CISO’s Best Friend And Worst Enemy

By Neelesh Kripalani, Chief Technology Officer, Clover Infotech According to Gartner, by 2027, Generative AI (GenAI) will contribute to a…

Beware Of Malicious Chrome Installer From Chinese Hackers
27
Jul
2024

Beware Of Malicious Chrome Installer From Chinese Hackers

A malicious Chrome installer, ChromeSetup.msi, distributed via drive-by download, delivers a novel Gh0st RAT variant, dubbed Gh0stGambit, that evasively retrieves…