Play Ransomware Variant Attacking Linux ESXi Servers
23
Jul
2024

Play Ransomware Variant Attacking Linux ESXi Servers

Since ESXi servers host multiple virtual machines, which attract the threat actors most, a successful breach of these servers could…

Cybersecurity Insiders
23
Jul
2024

Standalone Service Mesh Solution or Lightweight Option: Which is Right for You?

Service mesh is a tool for adding observability, security, and traffic management capabilities at the application layer. A service mesh…

Strata Identity Continuity prevents mission-critical applications from going offline
23
Jul
2024

Strata Identity Continuity prevents mission-critical applications from going offline

Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity…

Enhancing mobile app security with behaviour-based biometrics
23
Jul
2024

Enhancing mobile app security with behaviour-based biometrics

It’s estimated that 75% of security vulnerabilities go undiscovered. Much of this has to do simply with ease of access…

CrowdStrike
23
Jul
2024

Fake CrowdStrike repair manual pushes new infostealer malware

CrowdStrike is warning that a fake recovery manual to repair Windows devices is installing a new information-stealing malware called Daolpu….

Top Phishing Campaigns in July 2024: SharePoint Abuse, DeerStealer, and More
23
Jul
2024

Top Phishing Campaigns in July 2024

July saw a new influx of phishing and malware campaigns. The analyst team at ANY.RUN sandbox is closely monitoring all…

Mexico's Largest ERP Provider ClickBalance Exposes 769 Million Records
23
Jul
2024

Mexico’s Largest ERP Provider ClickBalance Exposes 769 Million Records

ClickBalance ERP provider’s cloud database exposed 769 million records, including API keys and email addresses. Learn how this cloud security…

Jane Devry
23
Jul
2024

How To Manage Alert Overload and Build the Skills of Your Security Team

The security operations center faces significant challenges in the form of data overload and the resulting increases in ingestion costs….

LOKKER introduces web privacy risk summary for insurers
23
Jul
2024

LOKKER introduces web privacy risk summary for insurers

LOKKER released a new privacy solution for insurers: the ability to share on-demand web privacy risk reports with their insureds….

HATVIBE and CHERRYSPY Malware
23
Jul
2024

Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware

Jul 23, 2024NewsroomCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign…

Hybrid multicloud storage: Pros, cons and key workloads
23
Jul
2024

Hybrid multicloud storage: Pros, cons and key workloads

Hybrid multicloud storage is intended to create the best of all worlds. By mixing on-premise technology with multiple public cloud…

Beware Of Braodo Stealer That Steals Users' Login Credentials
23
Jul
2024

Beware Of Braodo Stealer That Steals Users’ Login Credentials

Stealers are one of the most used malicious tools that is used by threat actors. As such tools enable hackers…