Ghostwriter targeted Ukraine with PicassoLoader malware
29
Jul
2024

Ghostwriter targeted Ukraine with PicassoLoader malware

Belarus-linked APT Ghostwriter targeted Ukraine with PicassoLoader malware Pierluigi Paganini July 29, 2024 Belarus-linked APT group GhostWriter targeted Ukrainian organizations…

Misconfigured Selenium Grid servers abused for Monero mining
29
Jul
2024

Misconfigured Selenium Grid servers abused for Monero mining

Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool…

RADIUS Protocol Vulnerability Cisco
29
Jul
2024

RADIUS Protocol Vulnerability Impacted Multiple Cisco Products

A critical vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol has been disclosed, affecting multiple Cisco products. The…

Naveen Goud
29
Jul
2024

Microsoft CrowdStrike Software Update leading to Phishing Attacks

A couple weeks ago, an IT outage hit Microsoft Windows 10 and 11 servers shortly after CrowdStrike released a Falcon…

The cost of cybersecurity burnout: Impact on performance and well-being
29
Jul
2024

The cost of cybersecurity burnout: Impact on performance and well-being

This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout…

Gh0st RAT Trojan
29
Jul
2024

Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site

Jul 29, 2024NewsroomCybersecurity / Cyber Espionage The remote access trojan known as Gh0st RAT has been observed being delivered by…

Fake Falcon crash reporter installer used to target German Crowdstrike users
29
Jul
2024

Fake Falcon crash reporter installer used to target German Crowdstrike users

Fake Falcon crash reporter installer used to target German Crowdstrike users Pierluigi Paganini July 29, 2024 CrowdStrike warns about a…

Naveen Goud
29
Jul
2024

How Software Updates Can Lead to Cyber Attacks

In the world of cybersecurity, software updates are a double-edged sword. On one hand, they are crucial for patching vulnerabilities,…

Enhancing threat detection for GenAI workloads with cloud attack emulation
29
Jul
2024

Enhancing threat detection for GenAI workloads with cloud attack emulation

Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection…

Cirrus: Open-source Google Cloud forensic collection
29
Jul
2024

Cirrus: Open-source Google Cloud forensic collection

Cirrus is an open-source Python-based tool designed to streamline Google Cloud forensic evidence collection. It can streamline environment access and…

Why a strong patch management strategy is essential for reducing business risk
29
Jul
2024

Why a strong patch management strategy is essential for reducing business risk

In this Help Net Security interview, Eran Livne, Senior Director of Product Management, Endpoint Remediation at Qualys and Thomas Scheffler,…

CrowdStrike Outage Leads to Estimated Financial Loss of $5.4 Billion
29
Jul
2024

CrowdStrike Outage Leads to Estimated Financial Loss of $5.4 Billion

A recent global IT outage linked to CrowdStrike, a leading cybersecurity company, has resulted in an estimated $5.4 billion in…