Mandrake Spyware Resurges With New Advanced Evasion
30
Jul
2024

Mandrake Spyware Resurges With New Advanced Evasion

The Android spyware known as Mandrake has made a significant resurgence with a new variant. This Mandrake spyware has been…

Coding practices: The role of secure programming languages
30
Jul
2024

Coding practices: The role of secure programming languages

Safety and quality are not features that can be added through testing — they must be integral to the design….

Review: Action1 – Simple and powerful patch management
30
Jul
2024

Review: Action1 – Simple and powerful patch management

Although endpoint anti-malware and other security controls are now standard at the operating system level, keeping all endpoint software up-to-date…

Securing remote access to mission-critical OT assets
30
Jul
2024

Securing remote access to mission-critical OT assets

In this Help Net Security interview, Grant Geyer, Chief Strategy Officer at Claroty, discusses the prevalent vulnerabilities in Windows-based engineering…

Insecure file-sharing practices in healthcare put patient privacy at risk
30
Jul
2024

Insecure file-sharing practices in healthcare put patient privacy at risk

Healthcare organizations continue to put their business and patients at risk of exposing their most sensitive data, according to Metomic….

Proofpoint’s Email Protection Service Exploited to Send Millions of Phishing Emails
30
Jul
2024

Proofpoint’s Email Protection Service Exploited to Send Millions of Phishing Emails

A massive phishing campaign dubbed “EchoSpoofing” has exploited a critical vulnerability in Proofpoint’s email protection service, allowing cybercriminals to send…

Ransomware Gangs Exploiting VMware ESXi Auth Bypass Flaw for Mass Attacks
30
Jul
2024

Ransomware Gangs Exploiting VMware ESXi Authentication Bypass Flaw

Microsoft researchers have found a critical vulnerability in VMware’s ESXi hypervisors. Ransomware operators are using this problem to attack systems….

Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List
30
Jul
2024

Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List

USDoD hacker scrapes and leaks a 100,000-line Indicator of Compromise (IoC) list from CrowdStrike, revealing detailed threat intelligence data. The…

U.S. Department Of Justice Urges Court To Reject TikTok Appeal
30
Jul
2024

U.S. Department Of Justice Urges Court To Reject TikTok Appeal

The U.S. Department of Justice has asked an appeals court to reject legal challenges to a law requiring ByteDance, TikTok’s…

ACCC shifts support for broadband tax on 4G and 5G fixed wireless
30
Jul
2024

ACCC shifts support for broadband tax on 4G and 5G fixed wireless – Telco/ISP

The ACCC has made a case for the ‘broadband tax’ on NBN-equivalent services to be expanded to 4G and 5G…

UNC4393 Adapts Techniques After QAKBOT Takedown
30
Jul
2024

UNC4393 Adapts Techniques After QAKBOT Takedown

The threat actor group UNC4393, known for deploying BASTA ransomware, has undergone continuous changes in its tactics since mid-2022. Researchers…

ESXi
30
Jul
2024

Ransomware Actors Exploit VMware ESXi Bug: Microsoft

Microsoft researchers have observed multiple ransomware operators exploiting a recently patched vulnerability in ESXi hypervisors to gain full administrative control…