Ukraine Targeted by UAC-0050 Using Remcos RAT Pipe Method
05
Jan
2024

Ukraine Targeted by UAC-0050 Using Remcos RAT Pipe Method

Remcos RAT (Remote Control and Surveillance) is a type of Remote Access Trojan used for unauthorized access and control of…

Entro
05
Jan
2024

Exposed Secrets are Everywhere. Here’s How to Tackle Them

Picture this: you stumble upon a concealed secret within your company’s source code. Instantly, a wave of panic hits as…

Hackers Flood Dark Web Markets With Hijacked X Gold accounts
05
Jan
2024

Hackers Flood Dark Web Markets With Hijacked X Gold accounts

In the age of social media, verification badges hold significant power.  On Twitter, the coveted blue tick (now replaced with…

3 New Malicious PyPI Packages Deploy CoinMiner Linux
05
Jan
2024

3 New Malicious PyPI Packages Deploy CoinMiner Linux

Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…

Ukraine's Telecom
05
Jan
2024

Russian Hackers Had Covert Access to Ukraine’s Telecom Giant for Months

Jan 05, 2024NewsroomCyber Attack / Data Breach Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as…

Vulnerability in Endpoint Manager Solution
05
Jan
2024

Ivanti Releases Patch for Critical Vulnerability in Endpoint Manager Solution

Jan 05, 2024NewsroomVulnerability / Network Security Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager…

23andMe Data Leak Update: Lawsuits And Blame Game
05
Jan
2024

23andMe Data Leak Update: Lawsuits And Blame Game

In a startling turn of events following the 23andMe data leak update released today, the popular DNA analysis is grappling…

Snatch Ransomware Group Claims The FDVA Cyber Attack
05
Jan
2024

HealthEC Data Breach Sparks Cybersecurity Concerns

HealthEC LLC, a prominent population health technology company, has issued a notice regarding a cybersecurity event. This event of a…

Artificial Deception: The State Of “AI” In Defense and Offense
05
Jan
2024

Artificial Deception: The State Of “AI” In Defense and Offense

By Ken Westin, Field CISO, Panther Labs If you have seen any of my talks, I often say that the…

What is the qualification to become a Cybersecurity Analyst
05
Jan
2024

What is the qualification to become a Cybersecurity Analyst

Becoming a cybersecurity analyst typically requires a combination of education, skills, and practical experience. Here’s a general guide to the…

Snatch Ransomware Group Claims The FDVA Cyber Attack
05
Jan
2024

CISA ICS Advisory Lists 3 Systems’ Critical Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has published three advisories addressing security issues, vulnerabilities, and potential exploits in Industrial…

Attackers Can Bypass Windows Security Using New DLL Hijacking
05
Jan
2024

Attackers Can Bypass Windows Security Using New DLL Hijacking

Threat actors using the DLL Hijacking technique for persistence have been the order of the day and have been utilized…