IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
17
May
2024

IT Sustainability Think Tank: Helping CIOs and IT directors navigate the green IT landscape

In the contemporary landscape of corporate responsibility, environmental sustainability has become a vital concern. With enterprises facing increasing regulatory pressure…

CISA Adds Flaws To Known Exploited Vulnerabilities Catalog
17
May
2024

CISA Adds Flaws To Known Exploited Vulnerabilities Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its known exploited vulnerabilities catalog to include three new entries,…

New Cyber Attack Targeting Facebook Business Accounts
17
May
2024

New Cyber Attack Targeting Facebook Business Accounts

The email campaign impersonates the Facebook Ads Team to trick users into clicking a malicious link, as the email leverages…

ViperSoftX Malware Uses Deep Learning Model To Execute Commands
17
May
2024

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…

17
May
2024

US exposes scheme enabling North Korean IT workers to bypass sanctions

The US Justice Department had unsealed charges against a US woman and an Ukranian man who, along with three unidentified…

Legal Battles Emerge After Ascension Ransomware Attack
17
May
2024

Legal Battles Emerge After Ascension Ransomware Attack

Following the recent Ascension ransomware attack, legal challenges are mounting for the healthcare giant. Just days after the cyberattack disrupted…

Threat Actor USDoD Announces Creation of 'Breach Nation', Following BreachForums Take Down
17
May
2024

USDoD Announces Creation Of Breach Nation Forum

While the recent takedown of BreachForums by the FBI, in collaboration with international law enforcement agencies, marked a significant victory…

SugarGh0st RAT Attacking Organizations & Individuals in AI Research
17
May
2024

SugarGh0st RAT Attack Organizations & Individuals in AI Research

The cybersecurity company Proofpoint has found a new operation using the SugarGh0st Remote Access Trojan (RAT) that is going after…

New Linux Backdoor Attacking Linux Users Via Installation Packages
17
May
2024

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalog
17
May
2024

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May 17, 2024 CISA adds two…

North Korean hackers
17
May
2024

Five charged for cyber schemes to benefit North Korea’s weapons program

‚ÄčThe U.S. Justice Department charged five individuals today, a U.S. Citizen woman, a Ukrainian man, and three foreign nationals, for…

Norway Recommends Replacing SSLVPN to Stop Cyber Attacks
17
May
2024

Norway Recommends Replacing SSLVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…