Connectwise, F5 Software Flaws
22
Mar
2024

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

Mar 22, 2024NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software…

Nationwide IT infrastructure poised to absorb Virgin Money
22
Mar
2024

Nationwide building society falls victim to IT outage

Nationwide building society is recovering from an IT outage that caused significant difficulties for customers over a period of several…

New iLeakage attack steals emails, passwords from Apple Safari
22
Mar
2024

New GoFetch attack on Apple Silicon CPUs can steal crypto keys

A new side-channel attack called “GoFetch” impacts Apple M1, M2, and M3 processors and can be used to steal secret…

5 Steps to Effective Junior SOC Specialist Training
22
Mar
2024

5 Steps to Effective Junior SOC Specialist Training

The Security Operations Center (SOC) is critical to any organization’s cybersecurity strategy. Every SOC’s success hinges on the competence of…

#MIWIC2024: Chelsea Jarvie, CISO and Director at Neon Circle
22
Mar
2024

#MIWIC2024: Chelsea Jarvie, CISO and Director at Neon Circle

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…

TeamCity Vulnerability Exploits to Surge in Ransomware Attacks
22
Mar
2024

TeamCity Vulnerability Exploits to Surge in Ransomware Attacks

Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in…

StrelaStealer Phishing Attack
22
Mar
2024

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to…

Privacy and participation – technologies to open data for innovation
22
Mar
2024

Open Data Institute launches digital policy manifesto

The Open Data Institute (ODI) is calling on UK political parties to adopt a number of manifesto commitments around data,…

Keep Hackers Out of Your Kubernetes Cluster with These 5 Simple Tricks!
22
Mar
2024

Keep Hackers Out of Your Kubernetes Cluster with These 5 Simple Tricks!

Securing Kubernetes clusters may feel overwhelming, as it’s often challenging to prioritize security investments and focus on what matters. In…

AcidPour Attacking Linux Systems Running On x86 Architecture
22
Mar
2024

AcidPour Attacking Linux Systems Running On x86 Architecture

Linux systems are used widely for servers, cloud environments, and IoT devices, which makes them an attractive target to cybercriminals,…

DTX + UCX Manchester is Back: Global brands, cutting-edge technology and world-renowned speakers take centre stage
22
Mar
2024

DTX + UCX Manchester is Back: Global brands, cutting-edge technology and world-renowned speakers take centre stage

Digital Transformation EXPO Manchester (DTX) has announced the dates for this years exhibition, with the events doors opening on 22-…

Researched Hacked DHCP to Escalate Privileges in Windows
22
Mar
2024

Researched Hacked DHCP to Escalate Privileges in Windows

Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…