Seedworm Hackers Exploit RMM Tools to Deliver Malware
24
Apr
2024

Seedworm Hackers Exploit RMM Tools to Deliver Malware

The notorious hacking group Seedworm, also known as MuddyWater, has been found exploiting legitimate remote monitoring and management (RMM) tools…

'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks
24
Apr
2024

‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks

Network security appliances like firewalls are meant to keep hackers out. Instead, digital intruders are increasingly targeting them as the…

Ransomware criminals target backups for assured ransom
24
Apr
2024

Ransomware testing being done on developing countries

In recent times, our attention has been drawn to ransomware attacks targeting both public and private entities. However, a new…

SuiteConnect London 2024: GenAI everywhere the refrain
24
Apr
2024

SuiteConnect London 2024: GenAI everywhere the refrain

Two of Oracle’s leading executives put forward GenAI ubiquity as a guiding theme of the supplier’s business applications offer in…

Google Meet opens client-side encrypted calls to non Google users
24
Apr
2024

Google Meet opens client-side encrypted calls to non Google users

Google is updating the client-side encryption mechanism for Google Meet to allow external participants, including those without Google accounts, to…

Volkswagen Hacked
24
Apr
2024

Volkswagen Hacked – Hackers Stolen 19,000 Documents

Volkswagen, one of the world’s leading automotive manufacturers, has fallen victim to a sophisticated hacking operation in a significant cybersecurity…

Expert Insight: ‘Minding the Gap’: How can we work to make cyber accessible for women?
24
Apr
2024

Expert Insight: ‘Minding the Gap’: How can we work to make cyber accessible for women?

According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female,…

Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely
24
Apr
2024

Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely

The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype…

Google bets on AI-backed cyber controls for Workspace users
24
Apr
2024

Cyber training leader KnowBe4 to buy email security firm Egress

Security awareness training and phishing simulation specialist KnowBe4, the firm behind the popular Inside Man cyber training movies, has announced…

Ring customers get $5.6 million in privacy breach settlement
24
Apr
2024

Ring customers get $5.6 million in privacy breach settlement

The Federal Trade Commission is sending $5.6 million in refunds to Ring users whose private video feeds were accessed without…

CrushFTP Zero-Day Could Allow Attackers To Gain Complete Server Access
24
Apr
2024

CrushFTP 0-Day Could Allow Attackers Gain Complete Server Access

CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0. The vulnerability allows remote attackers with low privileges…

MySQL2 Flaw Vulnerability
24
Apr
2024

Phishing Attacks Rise By 58% As The Attackers Leverage AI Tools

AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns. Protecting data and…