Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR CodesRussian-aligned threat actors are exploiting Signal's linked devices feature to compromise accounts through malicious QR codes.
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom NetworksCisco has identified that the Chinese threat actor Salt Typhoon gained access to U.S. telecommunications companies using legitimate credentials and a known security flaw.
Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited-CISA Sounds AlarmCISA has documented new vulnerabilities due to active exploitation, emphasizing the importance of prompt security updates.
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMailThreat actors exploit AWS misconfigurations to launch phishing campaigns, increasing risks for organizations.
Researchers Link CACTUS Ransomware Tactics to Former Black Basta AffiliatesAffiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
7-year-old vulnerability exploited in Salt Typhoon attackSalt Typhoon exploits old vulnerabilities and stolen credentials, highlighting the critical need for stronger identity security and proactive measures against cyber threats.
Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR CodesRussian-aligned threat actors are exploiting Signal's linked devices feature to compromise accounts through malicious QR codes.
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom NetworksCisco has identified that the Chinese threat actor Salt Typhoon gained access to U.S. telecommunications companies using legitimate credentials and a known security flaw.
Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited-CISA Sounds AlarmCISA has documented new vulnerabilities due to active exploitation, emphasizing the importance of prompt security updates.
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMailThreat actors exploit AWS misconfigurations to launch phishing campaigns, increasing risks for organizations.
Researchers Link CACTUS Ransomware Tactics to Former Black Basta AffiliatesAffiliates from the Black Basta ransomware group are transitioning to CACTUS, sharing malicious tools to maintain persistent control over infected systems.
7-year-old vulnerability exploited in Salt Typhoon attackSalt Typhoon exploits old vulnerabilities and stolen credentials, highlighting the critical need for stronger identity security and proactive measures against cyber threats.
Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User CredentialsSniper Dz facilitates phishing attacks and has over 140,000 active phishing websites, allowing cybercriminals, even those with little tech knowledge, to easily conduct scams.
The summer of 2024: A season of disinformationThe summer of 2023 has seen unprecedented events that fuel misinformation and the misuse of AI technology.
Generative AI poses threat to election security, federal intelligence agencies warnGenerative AI poses a serious threat to election security, both domestically and internationally.
The summer of 2024: A season of disinformationThe summer of 2023 has seen unprecedented events that fuel misinformation and the misuse of AI technology.
Generative AI poses threat to election security, federal intelligence agencies warnGenerative AI poses a serious threat to election security, both domestically and internationally.
Summer Olympics: What IT Teams Need to Do Before & During the Event for Their BusinessesThreat actors exploit excitement of Paris Olympics, targeting online users for financial gain.
What's going on with Zscaler?Zscaler's response to a security breach was commended in the cyber sector as an example of transparent disclosure amidst increased attack frequency.
Threat actors look to stolen credentials | Computer WeeklyCyber criminals are increasingly using valid accounts to breach corporate networks, necessitating a focus on distinguishing between legitimate and malicious user activity.
What's going on with Zscaler?Zscaler's response to a security breach was commended in the cyber sector as an example of transparent disclosure amidst increased attack frequency.
Threat actors look to stolen credentials | Computer WeeklyCyber criminals are increasingly using valid accounts to breach corporate networks, necessitating a focus on distinguishing between legitimate and malicious user activity.
Never-before-seen Linux malware gets installed using 1-day exploitsLinux malware, NerbianRAT, circulated for at least two yearsCheckPoint identified Magnet Goblin using 1-day vulnerabilities to deliver Linux malware