Ghost Sites – Hackers May Steal Corporate Data From Deactivated Salesforce Communities
02
Jun
2023

Ghost Sites – Deactivated Salesforce Websites Data Leak

Researchers at Varonis Threat Labs discovered that some Salesforce sites were improperly deactivated or unmaintained SalesforceGhost Sites. Threat actors can…

The Evolving Landscape of Cybersecurity: Trends and Challenges
02
Jun
2023

The Evolving Landscape of Cybersecurity: Trends and Challenges

In today’s interconnected world, where technology permeates every aspect of our lives, ensuring robust cybersecurity has become an utmost priority….

02
Jun
2023

North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Jun 02, 2023Ravie LakshmananCyber Espionage / APT U.S. and South Korean intelligence agencies have issued a new alert warning of…

Dating Apps And Sites: Mitigating Chargebacks In 2023
02
Jun
2023

Vulnerability In MOVEit Transfer Exploited In The Wild

An unnamed vulnerability in MOVEit Transfer has been exploited in the wild and is expected to have caused data breaches….

Toyota Misconfiguration Data Leak
02
Jun
2023

Toyota Server Misconfiguration Leaks Owners Data

As per reports, On May 12, 2023, Toyota Motor Corporation discovered that they had been subject to a Potential data…

New infosec products of the week: June 2, 2023
02
Jun
2023

New infosec products of the week: June 2, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, ConnectSecure, CYTRACOM, Permit.io, and…

How defense contractors can move from cybersecurity to cyber resilience
02
Jun
2023

How defense contractors can move from cybersecurity to cyber resilience

As the world’s most powerful military and economic power, the United States also holds another, less impressive distinction: Cyber threat…

Dating Apps And Sites: Mitigating Chargebacks In 2023
02
Jun
2023

Google Workspace Security Issue Causes Data Exfiltration

Researchers have identified a critical Google Workspace security issue, which can lead to data exfiltration without leaving a trace. This…

Ransomware Attack Prevention Checklist – 2023
02
Jun
2023

Ransomware Attack Prevention Checklist – 2023

Businesses face significant hazards from ransomware attacks, which are capable of causing severe damage in a brief period. Over the…

Despite cutbacks, IT salaries expected to rise
02
Jun
2023

Despite cutbacks, IT salaries expected to rise

Despite rising labor costs, economic inflation, and companies making an effort to cut back, the salary outlook for IT professionals…

Zero-Day Vulnerability
02
Jun
2023

Zero-Day Vulnerability Actively Being Exploited

Jun 02, 2023Ravie Lakshmanan Zero-Day / Vulnerability A critical flaw in Progress Software’s in MOVEit Transfer managed file transfer application…

Cybercriminals use legitimate websites to obfuscate malicious payloads
02
Jun
2023

Cybercriminals use legitimate websites to obfuscate malicious payloads

According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The…