Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days
14
Jan
2024

Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Social engineer reveals effective tricks…

Hacker looking at infected devices
14
Jan
2024

Hacker spins up 1 million virtual servers to illegally mine crypto

A 29-year-old man in Ukraine was arrested this week for using hacked accounts to create 1 million virtual servers used…

Akira ransomware targets Finnish organizations
14
Jan
2024

Akira ransomware targets Finnish organizations

Akira ransomware targets Finnish organizations Pierluigi Paganini January 13, 2024 The Finish National Cybersecurity Center (NCSC-FI) warns of increased Akira ransomware…

Unravelling Retirement Banking Scams and How To Protect Yourself
14
Jan
2024

Unravelling Retirement Banking Scams and How To Protect Yourself

In the labyrinth of financial scams, one of the most insidious is the retirement banking scam. Imagine a lifetime of…

Akira ransomware targets Finnish organizations
14
Jan
2024

Akira ransomware targets Finnish organizations

Akira ransomware targets Finnish organizations Pierluigi Paganini January 13, 2024 The Finish National Cybersecurity Center (NCSC-FI) warns of increased Akira ransomware…

GitLab addressed critical vulnerability CVE-2023-5009
13
Jan
2024

GitLab fixed a critical zero-click account hijacking flaw

GitLab fixed a critical zero-click account hijacking flaw Pierluigi Paganini January 13, 2024 GitLab addressed two critical flaws impacting both…

A Bloody Pig Mask Is Just Part of a Wild New Criminal Charge Against eBay
13
Jan
2024

A Bloody Pig Mask Is Just Part of a Wild New Criminal Charge Against eBay

“EBay’s actions against us had a damaging and permanent impact on us—emotionally, psychologically, physically, reputationally, and financially—and we strongly pushed…

Babuk Ransomware Decryptor Updated to Recover Files Infected
13
Jan
2024

Babuk Ransomware Decryptor Updated to Recover Files Infected

Hackers use ransomware to encrypt victims’ files and render them inaccessible until a ransom is paid. This forces the victims…

Juniper Vulnerability
13
Jan
2024

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches

Jan 13, 2024NewsroomVulnerability / Network Security Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability…

Cryptojacking
13
Jan
2024

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

Jan 13, 2024NewsroomCryptojacking / Cloud Security A 29-year-old Ukrainian national has been arrested in connection with running a “sophisticated cryptojacking…

Snatch Ransomware Group Claims The FDVA Cyber Attack
13
Jan
2024

AI Enhanced Cybersecurity In The Digital Age

By Neelesh Kripalani, Chief Technology Officer, Clover Infotech In this increasingly digitized world, cybersecurity has become a critical concern. As…

7 Steps to Build a Defense in Depth Strategy for Your Home
13
Jan
2024

7 Steps to Build a Defense in Depth Strategy for Your Home

By Roger Spears – Cybersecurity Project Manager, Schneider Downs One of the primary pillars of cybersecurity is having a “defense…