What is Data Loss Prevention (DLP)? [Ultimate Guide]
What is Data Loss Prevention (DLP)? [Ultimate Guide] Data loss prevention (DLP) prohibits users on a business network from transferring sensitive data outside of the network. DLP systems assist networ...
What are the Different Methods of Threat Detection?
What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...
New Alchimist Framework Targets Windows, macOS, and Linux Systems
New Alchimist Framework Targets Windows, macOS, and Linux Systems Researchers discovered a new post-exploit C2 framework by the name of Alchimist. The framework targets devices using Windows, Lin...
SAP Fixes Critical Vulnerabilities in Commerce and Manufacturing Execu...
SAP Fixes Critical Vulnerabilities in Commerce and Manufacturing Execution Products SAP published its Security Patch Day document for October 2022. Five new high-severity security notes and ...
Aruba Released Patches for EdgeConnect's Critical Vulnerabilities
Aruba Released Patches for EdgeConnect’s Critical Vulnerabilities Aruba released security updates to fix several critical vulnerabilities. The vulnerabilities were found in its popular WAN manag...
The Week in Dark Web – 12 October 2022 – Access and Database Sales
The Week in Dark Web – 12 October 2022 – Access and Database Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last wee...
Microsoft October Patch Tuesday Fixes Actively Exploited Zero Day and ...
Microsoft October Patch Tuesday Fixes Actively Exploited Zero Day and 13 Critical Flaws Microsoft Patch Tuesday for this month fixes a total of 84 vulnerabilities, including an actively exploited zero...
Critical RCE Vulnerability with Max CVSS Score in VM2 Sandbox Library
Critical RCE Vulnerability with Max CVSS Score in VM2 Sandbox Library A critical vulnerability in vm2 might let a remote attacker bypass the sandbox environment and execute shell commands on...
What Skills Do You Need to Become a Better CISO?
What Skills Do You Need to Become a Better CISO? Chief information security officers (CISO) handle data protection and management’s strategic, operational, and financial aspects. These experts c...
What Do You Need to Know About Fortinet Critical Authentication Bypass...
What Do You Need to Know About Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684)? ...
BidenCash Carding Shop Returns With a Larger Credit Card Dump
BidenCash Carding Shop Returns With a Larger Credit Card Dump [Update] May 17, 2023: BidenCash has started buying and selling SSH credentials. The marketplace is now offering related new services. Add...
Unpatched RCE Vulnerability in Zimbra Actively Exploited
Unpatched RCE Vulnerability in Zimbra Actively Exploited Threat actors actively exploit Zimbra Collaboration Suite in the wild due to an unpatched vulnerability. Tracked as CVE-2022-413...
Major Cyber Attacks in Review: September 2022
Major Cyber Attacks in Review: September 2022 Threat actors did not sit idle throughout September. They messed with citizens of various governments, giant companies like Uber, and even the gaming indu...
Eternity Threat Group Distributing Multifunctional LilithBot Malware
Eternity Threat Group Distributing Multifunctional LilithBot Malware LilithBot, a multipurpose malware sample, was found by ThreatLabz. Further investigation indicated that malware was connected to th...
Cisco Patched High Severity Vulnerabilities in Some Products
Cisco Patched High Severity Vulnerabilities in Some Products Cisco released an advisory to announce fixes for two high-severity vulnerabilities. The vulnerabilities could allow a remote hacker to...
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and ...
New Spyware RatMilad Targets Middle Eastern Mobile Devices
New Spyware RatMilad Targets Middle Eastern Mobile Devices RatMilad, a newly discovered Android spyware, has been stealing data from mobile devices in the Middle East. The malware is spread thro...
Microsoft SQL Servers Infected by the New Malware: Maggie
Microsoft SQL Servers Infected by the New Malware: Maggie Maggie has emerged as a brand-new malware. The backdoor has already spread to hundreds of computers and is specifically designed to attack Mic...
APT Group Lazarus Exploits High Severity Flaw in Dell Driver
APT Group Lazarus Exploits High Severity Flaw in Dell Driver The state-sponsored Lazarus group has been using a new strategy called Bring Your Own Vulnerable Driver (BYOVD) attack. The ...
Optus Confirms Nearly 2.1M Australian Telecom Users' Data was Exposed ...
Optus Confirms Nearly 2.1M Australian Telecom Users’ Data was Exposed Optus disclosed a data leak involving nearly 2.1 million customer records. Customers’ personal information, includin...