Oil and Gas Cybersecurity: Recommendations Part 3
In the final part of our series, we look at the APT33 case study and several recommendations from our expert...
In the final part of our series, we look at the APT33 case study and several recommendations from our expert...
Researchers from threat intelligence firm Cyble reported a surge in attacks targeting virtual network computing (VNC). Virtual Network Computing (VNC) is...
Security researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA Android...
Security Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers have discovered a...
China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a...
Flaws in Xiaomi Redmi Note 9T and Redmi Note 11 models could be exploited to disable the mobile payment mechanism and even...
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity...
Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin. The...
C The NCSC is currently inviting organisations to help develop a new Cyber Advisor service. The initial 100 Cyber Advisor...
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers....
We found APT group Iron Tiger's malware compromising chat application Mimi’s servers in a supply chain attack. If you like...
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The...
Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass...
The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack,...
For more than a year, we have been providing free intelligence services via the OpenTIP portal. Using the web interface,...
We tracked the latest deployment of the group behind CopperStealer, this time stealing cryptocurrencies and users’ wallet account information via...
Explore 5 security considerations in-line with cyber insurance requirements to renew or obtain a policy while reducing your cyber risk....
Palo Alto Networks devices running the PAN-OS are abused to launch reflected amplification denial-of-service (DoS) attacks. Threat actors are exploiting...
A former Twitter employee was found guilty of spying on certain Twitter users for Saudi Arabia. A former Twitter employee,...
Cisco addressed a high severity flaw, tracked as CVE-2022-20866, affecting Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software....
In late August 2020, we published an overview of DeathStalker’s profile and malicious activities, including their Janicab, Evilnum and PowerSing...
Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data....
New open source initiative helping organizations to detect and respond to cyber-attacks faster and easier If you like the site,...