Ransomware
11
Mar
2024

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains…

Vinnova launches National Digital Advancement project
11
Mar
2024

Vinnova launches National Digital Advancement project

Vinnova, the Swedish state agency for innovation, launched the latest-phase of a multi-branch national digital advancement (NDA) project in January,…

Cyberattack on Russian Election Systems
11
Mar
2024

Cyberattack On Russian Election Systems Amid 2024 Elections

Nebula, an anti-Putin hacktivist group, claimed a cyberattack on Russian election systems, targeting critical infrastructure for the upcoming Russian election….

Magnet Goblin group used a new Linux variant of NerbianRAT malware
11
Mar
2024

Magnet Goblin group used a new Linux variant of NerbianRAT malware

Magnet Goblin group used a new Linux variant of NerbianRAT malware Pierluigi Paganini March 11, 2024 The financially motivated hacking…

Beware of Fake Trading Apps on Google Play & App Store
11
Mar
2024

Beware of Fake Trading Apps on Google Play & App Store

A recent investigation unveiled a trend of fake trading apps on Google Play and the App Store designed to trick…

NSP Top Ten Cloud Security Practices
11
Mar
2024

PoC Exploit Released for OpenEdge and AdminServer.

A Proof of Concept (PoC) exploit has been released for a vulnerability in the OpenEdge Authentication Gateway and AdminServer. This…

Biometrics and surveillance camera commissioner resigns
11
Mar
2024

TechUK calls for next government to introduce ‘industrial strategy’ for AI

Tech companies have urged the next government to adopt an “industrial strategy” to accelerate the take-up of artificial intelligence (AI)…

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities Linux Servers
11
Mar
2024

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities Linux Servers

Threat actors often target Linux servers due to their widespread use in critical infrastructure, web hosting, and cloud environments.  The…

NSP Top Ten Cloud Security Practices
11
Mar
2024

Matanbuchus Malware Weaponizing XLS files to Hijack Windows

The Matanbuchus malware has been reported to initiate a new campaign, exploiting XLS files to compromise Windows machines. This sophisticated…

week in security
11
Mar
2024

A week in security (March 4 – March 10)

March 8, 2024 – The flaws could allow an attacker with privileged access to a guest VM to access the…

Hackers exploited WordPress Popup Builder plugin flaw to compromise 3,300 sites
11
Mar
2024

Hackers exploited WordPress Popup Builder plugin flaw to compromise 3,300 sites

Hackers exploited WordPress Popup Builder plugin flaw to compromise 3,300 sites Pierluigi Paganini March 11, 2024 Threat actors are hacking…

Top 10 Cloud Security Mitigation Strategies
11
Mar
2024

Top 10 Cloud Security Mitigation Strategies

NSA and CISA jointly released “Top 10 Cloud Security Mitigation Strategies” to advise cloud users on critical security practices for…