22
Feb
2023

Most vulnerabilities associated with ransomware are old

Researchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking…

Havoc Framework for Post-Exploitation
22
Feb
2023

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

Feb 22, 2023Ravie LakshmananExploitation Framework / Cyber Threat An open source command-and-control (C2) framework known as Havoc is being adopted…

22
Feb
2023

VMware Carbon Black has critical vulnerability – Security

VMware has disclosed a critical vulnerability in its Carbon Black endpoint security platform. Carbon Black provides application control, anti-virus and…

Google confirms Russian cyber-attacks on Ukraine
22
Feb
2023

Google confirms Russian cyber-attacks on Ukraine

After two days in this month, the war between Ukraine and Russian will enter its second year after completing one…

22
Feb
2023

Are your IoT devices at risk? Cybersecurity concerns for 2023

In this Help Net Security video, J.R. Cunningham, CSO at Nuspire, discusses IoT cybersecurity concerns for 2023. With homes becoming…

GoDaddy says it's a victim of multi-year cyberattack campaign
22
Feb
2023

GoDaddy says it’s a victim of multi-year cyberattack campaign

Hosting and domain name company GoDaddy says it believes a “sophisticated threat actor group” has been subjecting the company to…

CISA KEV Catalog
22
Feb
2023

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

Feb 22, 2023Ravie LakshmananCyber Risk / Patch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three…

Nine finds its next tech chief
22
Feb
2023

Nine finds its next tech chief – Training & Development

Memo Hayek (Credit: Nine) Nine has appointed Memo Hayek as its new chief information and technology officer, following the departure…

sn1per - An Automated Penetration Testing Tool
22
Feb
2023

sn1per – An Automated Penetration Testing Tool

Sn1per is an automated scanner that can automate the process of collecting data for exploration and penetration testing. In their…

22
Feb
2023

The top security threats to GraphQL APIs and how to address them

Enterprises looking to modernize their APIs are increasingly switching from the REST architecture to the open-source data query and manipulation…

Twitter and 2 factor authentication: what's changing?
22
Feb
2023

Twitter and 2 factor authentication: what’s changing?

Twitter is making radical changes to how two factor authentication works on the site. What’s happening, and when do these…

VMware Patches Critical Vulnerability in Carbon Black App Control Product
22
Feb
2023

VMware Patches Critical Vulnerability in Carbon Black App Control Product

Feb 22, 2023Ravie LakshmananVulnerability / Enterprise Security VMware on Tuesday released patches to address a critical security vulnerability affecting its…