Cyber Threat Landscape
25
Jan
2024

7 Key Findings and Upcoming Trends for 2024

The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
25
Jan
2024

IT Sustainability Think Tank: Why 2024 should be less about predicting and more about acting

The year 2023 was another one characterised by uncertainty. Once again, global instability has muddied the waters, making coming up…

AI expected to increase volume, impact of cyberattacks
25
Jan
2024

AI expected to increase volume, impact of cyberattacks

All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s…

Hackers Hijack Software Updates
25
Jan
2024

China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests…

Cloud is not always the answer: Five reasons why
25
Jan
2024

Cloud is not always the answer: Five reasons why

For a growing number of organisations, the default option for new IT projects is the cloud and cloud storage, with…

Russia-linked APT group Midnight Blizzard hacked HPE
25
Jan
2024

Russia-linked APT group Midnight Blizzard hacked HPE

Russia-linked APT group Midnight Blizzard hacked Hewlett Packard Enterprise (HPE) Pierluigi Paganini January 25, 2024 Hewlett Packard Enterprise (HPE) revealed…

HP Hacked by Russian 'Cozy Bear' hacker Group
25
Jan
2024

HP Hacked by Russian ‘Cozy Bear’ hacker Group

On December 12, 2023, Hewlett Packard Enterprise (HPE) received chilling news: the notorious nation-state actor Midnight Blizzard, also known as…

Webinar
25
Jan
2024

Hackers Targeting Indian Users with Fake Android Loan Apps

Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for…

MacOS Stealer
25
Jan
2024

PANDA’s Threat Goes On Sale For $3000

A new MacOS stealer has surfaced on the dark web, causing concern among cybersecurity experts. Operating under a mysterious name,…

Automated Emulation: Open-source breach and attack simulation lab
25
Jan
2024

Automated Emulation: Open-source breach and attack simulation lab

Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution…

CherryLoader Malware
25
Jan
2024

New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

Jan 25, 2024NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader has been discovered by threat hunters…

Cyberattack On Hewlett Packard Enterprise By Cozy Bear
25
Jan
2024

Cyberattack On Hewlett Packard Enterprise By Cozy Bear

In a disclosure to the Securities and Exchange Commission (SEC), Hewlett Packard Enterprise Company (HPE) revealed that it had fallen…