Drivers Exploited To Deploy GHOSTENGINE Payload
22
May
2024

Drivers Exploited To Deploy GHOSTENGINE Payload

Cybersecurity researchers uncovered a sophisticated cryptojacking campaign that leverages vulnerable drivers to disable well-known security solutions, thereby evading detection. This…

A malware campaign exploits Microsoft Exchange Server flaws
22
May
2024

A malware campaign exploits Microsoft Exchange Server flaws

An ongoing malware campaign exploits Microsoft Exchange Server flaws Pierluigi Paganini May 22, 2024 A threat actor is targeting organizations…

Enhancing Security Solutions through AWS Marketplace Integration
22
May
2024

Enhancing Security Solutions through AWS Marketplace Integration

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP, is…

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech
22
May
2024

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech

In 2020, Tesla even wrote in a filing to the US Federal Communications Commission that it would be implementing ultra-wideband…

Enhancing Security Solutions through AWS Marketplace Integration
22
May
2024

Enhancing Security Solutions through AWS Marketplace Integration

Torrance, United States / California, May 22nd, 2024, CyberNewsWire AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced…

Breaking Down the WebTPA Data Breach: Expert Analysis and Perspectives
22
May
2024

Breaking Down the WebTPA Data Breach: Expert Analysis and Perspectives

The recent WebTPA data breach has impacted approximately 2.4 million individuals, with unauthorized access to a network server leading to…

PlexTrac Plex AI helps offensive security teams write reports
22
May
2024

PlexTrac Plex AI helps offensive security teams write reports

PlexTrac announced Plex AI, the company’s AI-powered offensive security report writing tool, real-time team collaboration to enable simultaneous report editing…

Women in Data: BAE Systems’ CDO on why diversity in data matters
22
May
2024

Women in Data: BAE Systems’ CDO on why diversity in data matters

Working with wild gorillas and rescue gibbons isn’t the traditional route into a career in data and technology. But for…

China
22
May
2024

Chinese hackers hide on military and govt networks for 6 years

A previously unknown threat actor dubbed “Unfading Sea Haze” has been targeting military and government entities in the South China…

A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology
22
May
2024

A Consolidated Approach to Fraud: Bringing Together Risk Insights, Organizations and Technology

By Kimberly Sutherland, vice president, fraud and identity strategy, LexisNexis® Risk Solutions Digital fraud has seen a substantial increase in…

Zoom Announces Advanced Encryption for Increased Meeting Security
22
May
2024

Zoom Announces Advanced Encryption for Increased Meeting Security

Zoom Meetings now offer post-quantum end-to-end encryption, safeguarding your confidential conversations even from the potential threat of quantum computers. This…

How Cybercriminals Determine Targets, Attack Identities, And Violate Privacy
22
May
2024

How Cybercriminals Determine Targets, Attack Identities, And Violate Privacy

22 May Privacy Pandemic: How Cybercriminals Determine Targets, Attack Identities, And Violate Privacy Posted at 09:00h in Blogs by Di…