LilacSquid Targets IT, Energy, and Pharma Sectors
30
May
2024

LilacSquid Targets IT, Energy, and Pharma Sectors

May 30, 2024NewsroomCyber Espionage / Threat Intelligence A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to…

Europol sting operation smokes multiple botnets
30
May
2024

Europol sting operation smokes multiple botnets

Some of the most prominent malware-dropping botnets in operation today, including Bumblebee, IcedID, Pikabot, Smokeloader, SystemBC and Trickbot, have been…

Johnson & Johnson Breach Could Be Linked To Cencora Breach
30
May
2024

Johnson & Johnson Breach Could Be Linked To Cencora Breach

Pharmaceutical giant Johnson & Johnson recently announced a data breach that may stem from a larger data breach affecting Lash…

Pegasus Spyware, New Pegasus Spyware Infections, Latest Pegasus Spyware Infections
30
May
2024

7 New Pegasus Spyware Infections Spotted In Europe

Seven Russian and Belarusian-speaking independent journalists and opposition activists based in Europe were targeted or infected with NSO Group’s proprietary…

Hackerone logo
30
May
2024

Embracing Resilience: HackerOne’s Approach to Disaster Recovery

So, What Is Disaster Recovery? In the dynamic world of tech, things can break – sometimes due to our actions,…

Everbridge
30
May
2024

Everbridge warns of corporate systems breach exposing business data

Everbridge, an American software company focused on crisis management and public warning solutions, notified customers that unknown attackers had accessed…

‘Operation Endgame’ Hits Malware Delivery Platforms – Krebs on Security
30
May
2024

‘Operation Endgame’ Hits Malware Delivery Platforms – Krebs on Security

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the…

Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape
30
May
2024

Cross-Team Collaboration is Vital for Organizations in Today’s Digital Landscape

By Tony King, SVP International at NETSCOUT In today’s world, where the digital landscape is rapidly evolving, the cyber threat…

Palo Alto Networks Firewall Vulnerability
30
May
2024

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability

May 30, 2024NewsroomVulnerability / Cryptocurrency The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security…

Internet Archive Cyberattack Disrupted Services For 3 Days
30
May
2024

Internet Archive Cyberattack Disrupted Services For 3 Days

Internet Archive, one of the oldest online directories of websites, movies, books, software and more, is facing a cyberattack that…

Arrest
30
May
2024

Police seize over 100 malware loader servers, arrest four cybercriminals

An international law enforcement operation codenamed ‘Operation Endgame’ has seized over 100 servers worldwide used by multiple major malware loader…

WordPress Plugin Vulnerabilities
30
May
2024

Researchers Uncover Active Exploitation of WordPress Plugin Vulnerabilities

May 30, 2024NewsroomWordPress / Website Security Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being…