Kansas public transportation authority hit by ransomware
28
Jan
2024

Kansas City public transportation authority hit by ransomware

The Kansas City Area Transportation Authority (KCATA) announced it was targeted by a ransomware attack on Tuesday, January 23. KCATA…

Watch out, experts warn of a critical flaw in Jenkins
28
Jan
2024

Multiple PoC exploits released for Jenkins flaw CVE-2024-23897

Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Pierluigi Paganini January 28, 2024 Multiple proof-of-concept (PoC) exploits for recently disclosed…

Jenkins
28
Jan
2024

Exploits released for critical Jenkins RCE flaw, patch now

Multiple proof-of-concept (PoC) exploits for a critical Jenkins vulnerability allowing unauthenticated attackers to read arbitrary files have been made publicly…

Crypto Stealing PyPI Malware Hits Both Windows and Linux Users
28
Jan
2024

Crypto Stealing PyPI Malware Hits Both Windows and Linux Users

FortiGuard Labs’ latest research report reveals a concerning trend: threat actors are leveraging the Python Package Index (PyPI), an open…

How Phishing Undermines Business Security
28
Jan
2024

How Phishing Undermines Business Security

In an era where technology intertwines intricately with every facet of business operations, cybersecurity emerges as a buzzword and a…

Medusa ransomware attack hit Kansas City Area Transportation Authority
28
Jan
2024

Medusa ransomware attack hit Kansas City Area Transportation Authority

Medusa ransomware attack hit Kansas City Area Transportation Authority Pierluigi Paganini January 28, 2024 Medusa ransomware gang claimed responsibility for…

In Pursuit of a Passwordless Future
28
Jan
2024

In Pursuit of a Passwordless Future

By Rob Jenks, Senior Vice President of Corporate Strategy, Tanium  Many computer users dream of a day when the industry…

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT
28
Jan
2024

Insights from Billington Cybersecurity Summit 2023: The Enhanced Threat Surface of 5G/6G & IOT

By Dr. Torsten Staab, PhD, RTX Principal Technical Fellow From September 5th to September 8th of 2023, Billington Cybersecurity hosted…

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence
28
Jan
2024

It’s Time to Tear Down the Barriers Preventing Effective Threat Intelligence

By Denny LeCompte, CEO, Portnox Today, organizations are confronted with a deluge of cyber threats, ranging from sophisticated AI-powered ransomware…

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity
28
Jan
2024

Building For a More Secure Future: How Developers Can Prioritize Cybersecurity

By Jeremy Butteriss, EGM Ecosystem and Partnerships, Xero An iconic moment in the rise of ecosystems was Steve Ballmer on…

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes
28
Jan
2024

Week in review: 15 million Trello users’ scraped data on sale, attackers can steal NTLM hashes

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The reality of hacking threats…

Soap2day New Domain
28
Jan
2024

New Soap2day Domains Emerge Despite Legal Challenges

Soap2day permanently shut down in June 2023 – While the official site and its major mirror sites closed down, it…