Week in review: Atlassian Confluence RCE PoC, new Kali Linux, Patch Tuesday forecast
09
Jun
2024

Week in review: Atlassian Confluence RCE PoC, new Kali Linux, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: High-risk Atlassian Confluence RCE fixed,…

Microsoft Made Changes to Recall Feature Following Controversial Security Concerns
09
Jun
2024

Microsoft Made Changes to Recall Feature Following Controversial Security Concerns

Microsoft has announced significant updates to its new Recall feature for Copilot+ PCs, following a wave of security and privacy…

New York Times source code compromised via exposed GitHub token
09
Jun
2024

New York Times source code compromised via exposed GitHub token

New York Times source code compromised via exposed GitHub token Pierluigi Paganini June 08, 2024 The source code and data…

The New York Times building
08
Jun
2024

New York Times source code stolen using exposed GitHub token

Internal source code and data belonging to The New York Times was leaked on the 4chan message board after being…

Beware of Fake Google Chrome Update Pop-Ups that Installs Malware
08
Jun
2024

Beware of Fake Chrome Update Pop-Ups that Installs Malware

In the ever-changing cybersecurity landscape, a persistent threat appears in the form of a fake Chrome update.  Usually, these efforts…

GoldPickaxe iOS Malware Harvests Facial Recognition Data
08
Jun
2024

GoldPickaxe iOS Malware Harvests Facial Recognition Data

Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Store…

Jane Devry
08
Jun
2024

The Underestimated Cyber Threat: Anticipating and Combatting Supply Chain Attacks

Cybersecurity threats are multi-faceted, often connected, and accelerating fast. Ransomware, nation-state attacks, employee errors, and third parties – all pose…

DDoS
08
Jun
2024

DDoS attacks target EU political parties as elections begin

Hacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according to a…

Kimsuky APT Exploiting Facebook And MS Console For Targeted Attacks
08
Jun
2024

Kimsuky APT Exploiting Facebook And MS Console For Targeted Attacks

Facebook and MS Console are often targeted by hackers, as they contain a lot of personal and sensitive data that…

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations
08
Jun
2024

Sticky Werewolf Weaponizing LNK Files Group Attacking To Attack Organizations

Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…

Jane Devry
08
Jun
2024

Upcoming June 11th CISA Deadline Exposes Widespread Unpreparedness in Software Security Compliance

A recent study by Lineaje has uncovered a startling lack of preparedness among organizations for the upcoming U.S. Cybersecurity &…

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter
08
Jun
2024

Cyber Resiliency in The Age Of AI: Securing the Digital Perimeter

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Technology…