Sysrv Botnet Abuses Google Subdomain To Spread XMRig Miner
22
Mar
2024

Sysrv Botnet Abuses Google Subdomain To Spread XMRig Miner

First identified in 2020, Sysrv is a botnet that uses a Golang worm to infect devices and deploy cryptominers, propagates…

The human impact of ransomware attacks: how can businesses protect their security professionals?
22
Mar
2024

The human impact of ransomware attacks: how can businesses protect their security professionals?

By Tony Hasek, CEO at Goldilock With the annual cost of cybercrime estimated to have cost UK businesses over £30.5…

Researchers Propose An Invisible Backdoor Attack Dubbed DEBA
22
Mar
2024

Researchers Propose An Invisible Backdoor Attack Dubbed DEBA

As deep neural networks (DNNs) become more prevalent, concerns over their security against backdoor attacks that implant hidden malicious functionalities…

IONIX Advances Industry Leading Attack Surface Management (ASM) Platform With Centralized Threat Center for Swift Zero-day Response
22
Mar
2024

IONIX Advances Industry Leading Attack Surface Management (ASM) Platform With Centralized Threat Center for Swift Zero-day Response

Tel Aviv-based IONIX has unveiled a groundbreaking enhancement to its Attack Surface Management (ASM) platform: the introduction of a centralized…

Connectwise, F5 Software Flaws
22
Mar
2024

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

Mar 22, 2024NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software…

Nationwide IT infrastructure poised to absorb Virgin Money
22
Mar
2024

Nationwide building society falls victim to IT outage

Nationwide building society is recovering from an IT outage that caused significant difficulties for customers over a period of several…

New iLeakage attack steals emails, passwords from Apple Safari
22
Mar
2024

New GoFetch attack on Apple Silicon CPUs can steal crypto keys

A new side-channel attack called “GoFetch” impacts Apple M1, M2, and M3 processors and can be used to steal secret…

5 Steps to Effective Junior SOC Specialist Training
22
Mar
2024

5 Steps to Effective Junior SOC Specialist Training

The Security Operations Center (SOC) is critical to any organization’s cybersecurity strategy. Every SOC’s success hinges on the competence of…

#MIWIC2024: Chelsea Jarvie, CISO and Director at Neon Circle
22
Mar
2024

#MIWIC2024: Chelsea Jarvie, CISO and Director at Neon Circle

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light…

TeamCity Vulnerability Exploits to Surge in Ransomware Attacks
22
Mar
2024

TeamCity Vulnerability Exploits to Surge in Ransomware Attacks

Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in…

StrelaStealer Phishing Attack
22
Mar
2024

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to…

Privacy and participation – technologies to open data for innovation
22
Mar
2024

Open Data Institute launches digital policy manifesto

The Open Data Institute (ODI) is calling on UK political parties to adopt a number of manifesto commitments around data,…