UAC-0050 Hacked Thousands Of Email Addresses
08
Mar
2024

UAC-0050 Hacked Thousands Of Email Addresses

Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable…

QEMU Emulator as Tunneling Tool
08
Mar
2024

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling…

Encourage Women in Cybersecurity Careers
08
Mar
2024

7 Strategies To Encourage Women In Cybersecurity

In the fast-paced world of cybersecurity, diversity isn’t just a buzzword; it’s a necessity for success. Yet, the door to…

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration
08
Mar
2024

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration

Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration. Pierluigi Paganini March 08,…

Snort 2.9.8.3 and Snort 2.9.13.0 End of Life for Talos Rules
08
Mar
2024

Snort 2.9.8.3 and Snort 2.9.13.0 End of Life for Talos Rules

The end-of-life for Talos rules support for two versions of the widespread intrusion detection and prevention system Snort has been…

VPN Hijacking Bug
08
Mar
2024

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

Mar 08, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a high-severity security flaw impacting its Secure Client…

Surge in Malicious Emails Bypassing Secure Email Gateways
08
Mar
2024

Surge in Malicious Emails Bypassing Secure Email Gateways

The frequency of malicious emails successfully circumventing Secure Email Gateways (SEGs) has doubled in the past year. This surge highlights the evolving sophistication of cyber threats and the challenges organizations face in…

How new and old security threats keep persisting
08
Mar
2024

How new and old security threats keep persisting

Security leaders recognize that the pattern of buying new tech and the frantic state of find-fix vulnerability management is not…

FBI Releases Internet Crime Report for 2023 : 22% Surge
08
Mar
2024

FBI Releases Internet Crime Report for 2023 : 22% Surge

Federal Bureau of Investigation (FBI) has published its annual Internet Crime Report for 2023, highlighting a significant 22% increase in…

March 2024 Patch Tuesday forecast: A popular framework updated
08
Mar
2024

March 2024 Patch Tuesday forecast: A popular framework updated

We’re almost at our third Patch Tuesday and wrapping up the first quarter 2024. Time flies by! Microsoft is starting…

JetBrains TeamCity Vulnerability
08
Mar
2024

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security…

Understanding Types of Cloud Malware and Effective Defense Strategies
08
Mar
2024

Understanding Types of Cloud Malware and Effective Defense Strategies

In recent years, as businesses and individuals increasingly rely on cloud computing services for storage, collaboration, and data processing, cyber-criminals…