Specula Tool Leveraging Registry to Turn Outlook Into a C2 Server
01
Aug
2024

Specula Tool Turns Outlook Into A C2 Server By Leveraging Registry

Specula tool utilizes a Registry to turn Microsoft Outlook Into a C2 Server capable of executing arbitrary commands. Fundamentally, Specula…

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers
01
Aug
2024

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers

Beaumont describes the RayV Lite as part of a larger trend she calls the “domestication of tooling”: Devices like the…

Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks
01
Aug
2024

Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks

A recently discovered vulnerability in Bitdefender’s GravityZone Update Server has raised significant security concerns. Identified as CVE-2024-6980, this flaw allows…

Cado platform enhances SOC efficiency with AI-driven workflow automation
01
Aug
2024

Cado platform enhances SOC efficiency with AI-driven workflow automation

Cado Security has unveiled that the Cado platform now enables customers to dramatically streamline the effectiveness of their SOC using…

encrypted cookies
01
Aug
2024

Google Chrome Adds App-Bound Encryption to Protect Cookies from Malware

Aug 01, 2024Ravie LakshmananData Encryption / Browser Security Google has announced that it’s adding a new layer of protection to…

Natural History Museum partners with AWS to restore and protect urban nature
01
Aug
2024

Natural History Museum partners with AWS to restore and protect urban nature

Now, the museum is turning its attention to the future, unveiling its new gardens in July as a centre piece…

Fresnillo Cybersecurity Incident: Operations Unaffected
01
Aug
2024

Fresnillo Cybersecurity Incident: Operations Unaffected

Fresnillo plc, the world’s largest primary silver producer and Mexico’s leading gold producer has reported a cybersecurity incident resulting in…

Naveen Goud
01
Aug
2024

Android Mobile Security alert against SMS Stealer Malware

A new type of malware, known as SMS Stealer, is making waves in the cybersecurity world. Designed to harvest one-time…

DDoS Attack
01
Aug
2024

DDoS Attacks May Disrupt 2024 US Election Info

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint announcement to…

Why CISOs face greater personal liability
01
Aug
2024

Why CISOs face greater personal liability

In this Help Net Security interview, Christos Tulumba, CISO at Veritas Technologies, discusses the key factors contributing to increased personal…

Threat intelligence: A blessing and a curse?
01
Aug
2024

Threat intelligence: A blessing and a curse?

Access to timely and accurate threat intelligence is now core to security operations for many organizations. Today, it seems that…

Weaponized Google Authenticator
01
Aug
2024

Weaponized Google Authenticator Via Google Ads Steals Sensitive Data

In recent days, threat actors have leveraged the popular Google Authenticator (a multi-factor authentication program) through Google ads, infecting devices…