Open-Source Tools
18
Jul
2024

New Threat Actor Uses Open-Source Tools for Widespread Attacks

Jul 18, 2024NewsroomOpen-Source / Cybercrime Unknown threat actors have been observed leveraging open-source tools as part of a suspected cyber…

Government trusted ‘abuser’ over the abused on Post Office scandal
18
Jul
2024

Government trusted ‘abuser’ over the abused on Post Office scandal

The government trusted the views of the Post Office over allegations by subpostmasters that they were being mistreated over unexplained…

Cybercriminals Heavily Preparing For 2024 Paris Olympic Games Based Attacks
18
Jul
2024

Cybercriminals Heavily Preparing For 2024 Paris Olympic Games Based Attacks

Major sporting events with massive online audiences, like the World Cup and Olympics, have become magnets for cyberattacks, which are…

Spotlight on DeepKeep.ai
18
Jul
2024

Spotlight on DeepKeep.ai – Cyber Defense Magazine

DeepKeep, the leading provider of AI-Native Trust, Risk, and Security Management (TRiSM), empowers large corporations that rely on AI, GenAI,…

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools
18
Jul
2024

Octo Tempest Attacking VMWare ESXi Servers Added new Ransom Tools

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…

FIN7 Cybercrime Gang Evolves with Ransomware and Hacking Tools
18
Jul
2024

FIN7 Cybercrime Gang Evolves with Ransomware and Hacking Tools

FIN7, a notorious cybercrime gang, is back with a new bag of tricks! Learn about FIN7’s evolving tactics, including ransomware…

Jane Devry
18
Jul
2024

IT Professionals: Threat Intelligence is the Most Valued Skill to Combat AI-Powered Cyber Threats

As the cyber workforce skills gap persists, companies that fail to upskill their IT teams with the knowledge to defend…

HotPage Adware
18
Jul
2024

HotPage Adware Disguised as Ad Blocker Installs Malicious Kernel Driver

Jul 18, 2024NewsroomMalware / Windows Security Cybersecurity researchers have shed light on an adware module that purports to block ads…

Cisco
18
Jul
2024

Critical Cisco bug lets hackers add root users on SEG devices

Cisco has fixed a critical severity vulnerability that lets attackers add new users with root privileges and permanently crash Security…

New VPN Port Shadow Vulnerabilities Let Attacker Intercept Encrypted Traffic
18
Jul
2024

New VPN Port Shadow Vulnerabilities Let Attacker Intercept Encrypted Traffic

Researchers examined how connection tracking, a fundamental function in operating systems, can be exploited to compromise VPN security and identified…

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware
18
Jul
2024

MuddyWater Hackers Deploy Legitimate RMM With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle…

The Importance Of Women In Cybersecurity
18
Jul
2024

The Importance Of Women In Cybersecurity

18 Jul The Importance Of Women In Cybersecurity Posted at 08:54h in Blogs by Di Freeze This week in cybersecurity…