May 2023

Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks

Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks 15/05/2023 at 17:47 By Several security vulnerabilities have been disclosed in cloud management platforms associated with three industrial cellular router vendors that could expose operational technology (OT) networks to external attacks. The findings were presented by Israeli industrial cybersecurity firm OTORIO at the Black Hat Asia

React to this headline:

Loading spinner

Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks Read More »

New Ransomware Gang RA Group Hits U.S. and South Korean Organizations

New Ransomware Gang RA Group Hits U.S. and South Korean Organizations 15/05/2023 at 17:47 By A new ransomware group known as RA Group has become the latest threat actor to leverage the leaked Babuk ransomware source code to spawn its own locker variant. The cybercriminal gang, which is said to have been operating since at least April

React to this headline:

Loading spinner

New Ransomware Gang RA Group Hits U.S. and South Korean Organizations Read More »

Why High Tech Companies Struggle with SaaS Security

Why High Tech Companies Struggle with SaaS Security 15/05/2023 at 17:47 By It’s easy to think high-tech companies have a security advantage over other older, more mature industries. Most are unburdened by 40 years of legacy systems and software. They draw some of the world’s youngest, brightest digital natives to their ranks, all of whom

React to this headline:

Loading spinner

Why High Tech Companies Struggle with SaaS Security Read More »

Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign

Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign 15/05/2023 at 17:47 By Government, aviation, education, and telecom sectors located in South and Southeast Asia have come under the radar of a new hacking group as part of a highly-targeted campaign that commenced in mid-2022 and continued into the first quarter of 2023.

React to this headline:

Loading spinner

Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign Read More »

New ‘MichaelKors’ Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems

New ‘MichaelKors’ Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems 15/05/2023 at 17:47 By A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target Linux and VMware ESXi systems as of April 2023. The development points to cybercriminal actors increasingly setting their eyes on the ESXi, cybersecurity firm CrowdStrike said in a report

React to this headline:

Loading spinner

New ‘MichaelKors’ Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems Read More »

Parablu to deliver Microsoft Azure-hosted cybersecurity and data resiliency SaaS solutions

Parablu to deliver Microsoft Azure-hosted cybersecurity and data resiliency SaaS solutions 15/05/2023 at 17:30 By Industry News Parablu has unveiled a multi-year agreement with Microsoft that integrates engineering, go-to-market activities, and co-selling of Parablu’s BluVault and the Ransomware Defense Suite Software-as-a-Service (SaaS) offerings. Parablu will leverage Microsoft Cloud infrastructure and services –– Microsoft Azure and

React to this headline:

Loading spinner

Parablu to deliver Microsoft Azure-hosted cybersecurity and data resiliency SaaS solutions Read More »

Cloudflare One for AI helps organizations to safely use generative AI tools

Cloudflare One for AI helps organizations to safely use generative AI tools 15/05/2023 at 17:00 By Industry News Cloudflare has extended its SASE platform, Cloudflare One, to generative artificial intelligence (AI) services. Cloudflare One for AI, a suite of zero trust security controls, will enable enterprises to safely and securely use the latest generative AI

React to this headline:

Loading spinner

Cloudflare One for AI helps organizations to safely use generative AI tools Read More »

Financial sector has highest password reuse rate

Financial sector has highest password reuse rate 15/05/2023 at 17:00 By Employee exposure was measured in a report that observed a 62% password reuse rate among Fortune 1000 employees who have been exposed more than once.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Financial sector has highest password reuse rate Read More »

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules 15/05/2023 at 13:12 By Water Orthrus has been active recently with two new campaigns. CopperStealth uses a rootkit to install malware on infected systems, while CopperPhish steals credit card information. This blog will provide the structure of the campaign and how they work. This article is

React to this headline:

Loading spinner

Water Orthrus’s New Campaigns Deliver Rootkit and Phishing Modules Read More »

Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades

Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades 15/05/2023 at 13:12 By Associated Press The Philadelphia Inquirer experienced the most significant disruption to its operations in 27 years due to a cyberattack on Sunday, May 14, 2023. The post Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades appeared first

React to this headline:

Loading spinner

Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades Read More »

CISA: Several Old Linux Vulnerabilities Exploited in Attacks

CISA: Several Old Linux Vulnerabilities Exploited in Attacks 15/05/2023 at 13:12 By Eduard Kovacs Several old Linux vulnerabilities for which there are no public reports of malicious exploitation have been added to CISA’s KEV catalog. The post CISA: Several Old Linux Vulnerabilities Exploited in Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

CISA: Several Old Linux Vulnerabilities Exploited in Attacks Read More »

SquareX’s vision: A future where internet security is a non-issue

SquareX’s vision: A future where internet security is a non-issue 15/05/2023 at 12:11 By Mirko Zorz With an ever-evolving landscape of cyber threats, the necessity for innovative, effective, and user-friendly security products has never been more apparent. Current security solutions, however, seem to lag behind, struggling to adequately address the challenges posed by increasingly sophisticated

React to this headline:

Loading spinner

SquareX’s vision: A future where internet security is a non-issue Read More »

Is human threat hunting a fool’s errand?

Is human threat hunting a fool’s errand? 15/05/2023 at 12:11 By Help Net Security We all have witnessed automated advances creep into our modern threat hunting processes – and with good reason. As the rate of cyberattacks steadily increases, automated threat hunting processes are being integrated to help stem the tide by providing quicker security

React to this headline:

Loading spinner

Is human threat hunting a fool’s errand? Read More »

CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware

CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware 15/05/2023 at 12:11 By Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign that’s designed to propagate a category of malware called CLR SqlShell that ultimately facilitates the deployment of cryptocurrency miners and ransomware. “Similar to web shell, which can

React to this headline:

Loading spinner

CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware Read More »

Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case

Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case 15/05/2023 at 12:11 By A former employee of Ubiquiti has been sentenced to six years in jail after he pleaded guilty to posing as an anonymous hacker and a whistleblower in an attempt to extort almost $2 million worth of cryptocurrency while working

React to this headline:

Loading spinner

Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case Read More »

Web entity activity reveals insights into internet security

Web entity activity reveals insights into internet security 15/05/2023 at 08:13 By Help Net Security For its recent research focusing on web entities (or content served over HTTP), Censys leveraged its internet-wide scan data to understand better the applications and services that have become core to our existence, evaluating the state of security on the

React to this headline:

Loading spinner

Web entity activity reveals insights into internet security Read More »

Intelligence and business risk integration in corporate security

Intelligence and business risk integration in corporate security 15/05/2023 at 08:13 By Intelligence-related activities found within today’s global security programs aids in the protection of people, physical assets, finances and intellectual property. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Intelligence and business risk integration in corporate security Read More »

Bad bots are coming for APIs

Bad bots are coming for APIs 15/05/2023 at 06:16 By Help Net Security In 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year, according to Imperva. The proportion of human traffic (52.6%) decreased to its lowest level in eight years. Bad bot traffic For the fourth consecutive year,

React to this headline:

Loading spinner

Bad bots are coming for APIs Read More »

Scroll to Top