Global CRM Provider Exposed Millions of Clients’ Files Online
31
Jan
2024

Data leak at fintech giant Direct Trading Technologies

Data leak at fintech giant Direct Trading Technologies Pierluigi Paganini January 31, 2024 Sensitive data and trading activity of over…

Free ransomware recovery tool White Phoenix now has a web version
31
Jan
2024

Free ransomware recovery tool White Phoenix now has a web version

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested…

Chinese Hackers
31
Jan
2024

Chinese Hackers Exploiting VPN Flaws to Deploy KrustyLoader Malware

Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual…

R00TK1T ISC Claims Cybersecurity Incident
31
Jan
2024

R00TK1T ISC Claims Cybersecurity Incident

The pro-Israeli hacktivist group, R00TK1T ISC Cyber Team, has allegedly targeted Malaysian entities, marking their first cyberattack on Aminia.  The…

Snatch Ransomware Group Claims The FDVA Cyber Attack
31
Jan
2024

NoName Cyberattack Hits Dutch Organizations

The NoName group claims to have launched a sophisticated cyberattack on multiple high-profile websites in the Netherlands. The targeted organizations…

Webinar
31
Jan
2024

45K+ Publicly Exposed Jenkins Instances Vulnerable to RCE Attacks

It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file…

Australian companies breach no ransomware payment policy
31
Jan
2024

Australian companies breach no ransomware payment policy

In response to the surge in ransomware attacks over the last couple of years, the Australian government introduced legislation in…

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management
31
Jan
2024

Proactive cybersecurity: A strategic approach to cost efficiency and crisis management

In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of…

Linux Hacking
31
Jan
2024

New Glibc Flaw Grants Attackers Root Access on Major Linux Distros

Jan 31, 2024NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux machines by taking advantage…

Facebook and Instagram collect immense data from users
31
Jan
2024

Precision in Action: A Guide to Handling Cybersecurity Incidents

In an era dominated by digital connectivity, the importance of robust cybersecurity cannot be overstated. As organizations navigate the complex…

Does CVSS 4.0 solve the exploitability problem?
31
Jan
2024

Does CVSS 4.0 solve the exploitability problem?

The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released…

Cybercriminals replace familiar tactics to exfiltrate sensitive data
31
Jan
2024

Cybercriminals replace familiar tactics to exfiltrate sensitive data

Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling…