2023

Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own

Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own 23/05/2023 at 21:33 By Ryan Naraine MikroTik patches a major security defect in its RouterOS product a full five months after it was exploited at Pwn2Own Toronto. The post Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Mikrotik Belatedly Patches RouterOS Flaw Exploited at Pwn2Own Read More »

Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign

Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign 23/05/2023 at 21:33 By Kevin Townsend A credential phishing campaign using the legitimate SuperMailer newsletter distribution app has doubled in size each month since January 2023. The post Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Threat Actor Abuses SuperMailer for Large-scale Phishing Campaign Read More »

Industrial sector faced highest number of ransomware attacks in April

Industrial sector faced highest number of ransomware attacks in April 23/05/2023 at 21:18 By The volume of ransomware attacks remained high with 352 attacks in April, the second-highest month on record, according to a recent report. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Industrial sector faced highest number of ransomware attacks in April Read More »

NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks

NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks 23/05/2023 at 20:39 By Industry News NETSCOUT has introduced Arbor Sightline Mobile and MobileStream to answer mobile network operators’ (MNO) need for scalable, real-time visibility, detection, and mitigation of threats that can impact the performance and availability of 4G/5G mobile consumer services

React to this headline:

Loading spinner

NETSCOUT introduces visibility and instrumentation for threat detection in 4G and 5G networks Read More »

Delinea Cloud Suite updates reduce the risk of lateral movement in cybersecurity breaches

Delinea Cloud Suite updates reduce the risk of lateral movement in cybersecurity breaches 23/05/2023 at 20:02 By Industry News Delinea announced the latest version of Cloud Suite, part of its Server PAM solution, which provides privileged access to and authorization for servers. Delinea Cloud Suite updates include more granular support for just-in-time (JIT) and just-enough

React to this headline:

Loading spinner

Delinea Cloud Suite updates reduce the risk of lateral movement in cybersecurity breaches Read More »

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments 23/05/2023 at 19:48 By Ionut Arghire The newly detailed GoldenJackal APT has been targeting government and diplomatic entities in the Middle East and South Asia since 2019. The post New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

New ‘GoldenJackal’ APT Targets Middle East, South Asia Governments Read More »

Hornetsecurity 365 Permission Manager helps companies protect critical data

Hornetsecurity 365 Permission Manager helps companies protect critical data 23/05/2023 at 19:31 By Industry News Hornetsecurity launched 365 Permission Manager – a user-friendly, admin-centred solution to manage permissions, enforce compliance policies, and monitor violations within Microsoft 365 (M365). This innovative solution brings ease and order to the tracking of employee access to M365 sites, files

React to this headline:

Loading spinner

Hornetsecurity 365 Permission Manager helps companies protect critical data Read More »

GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments

GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments 23/05/2023 at 19:18 By Government and diplomatic entities in the Middle East and South Asia are the target of a new advanced persistent threat actor named GoldenJackal. Russian cybersecurity firm Kaspersky, which has been keeping tabs on the group’s activities since mid-2020, characterized the adversary as both

React to this headline:

Loading spinner

GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments Read More »

Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud

Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud 23/05/2023 at 19:04 By Industry News Red Hat Advanced Cluster Security Cloud Service brings together Kubernetes-native security capabilities with the convenience and support of a fully Red Hat-managed offering. The cloud service enables organizations to take a security-forward approach to building,

React to this headline:

Loading spinner

Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud Read More »

TSA strengthens security for Memorial Day travel rush

TSA strengthens security for Memorial Day travel rush 23/05/2023 at 19:04 By  The TSA has announced various steps they’re taking to prepare for the high volume of passengers for Memorial Day and the summer travel season. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

TSA strengthens security for Memorial Day travel rush Read More »

Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks

Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks 23/05/2023 at 18:34 By Industry News Radware has introduced a new Cloud Web DDoS Protection solution to minimize the growing gap between standard DDoS mitigation and an emerging generation of more aggressive, layer 7 (L7), HTTPS Flood attacks—also known as Web DDoS Tsunami attacks. Radware’s solution

React to this headline:

Loading spinner

Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks Read More »

Vaultree unveils Fully Functional Data-In-Use Encryption solution for the healthcare sector

Vaultree unveils Fully Functional Data-In-Use Encryption solution for the healthcare sector 23/05/2023 at 18:34 By Industry News Vaultree announces a major leap forward in healthcare data protection, bringing its Fully Functional Data-In-Use Encryption solution to the sector. Coupled with a groundbreaking software development kit and encrypted chat tool, Vaultree’s technology revolutionizes the data encryption landscape,

React to this headline:

Loading spinner

Vaultree unveils Fully Functional Data-In-Use Encryption solution for the healthcare sector Read More »

New MDBotnet Unleashes DDoS Attacks

New MDBotnet Unleashes DDoS Attacks 23/05/2023 at 18:03 By cybleinc Cyble Research & Intelligence Labs analyzes MDBotnet, a malware variant of Russian origin, carrying out DDoS-as-a-Service attacks. The post New MDBotnet Unleashes DDoS Attacks appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

New MDBotnet Unleashes DDoS Attacks Read More »

Veriff Age Estimation prevents users from accessing age restricted products or services

Veriff Age Estimation prevents users from accessing age restricted products or services 23/05/2023 at 18:03 By Industry News Veriff announced its new Age Estimation solution, built to further streamline the age verification process for customers. Veriff Age Estimation uses facial biometrics to enable users to easily estimate their age with a selfie, rather than having

React to this headline:

Loading spinner

Veriff Age Estimation prevents users from accessing age restricted products or services Read More »

Stytch expands its platform to offer B2B authentication

Stytch expands its platform to offer B2B authentication 23/05/2023 at 17:49 By Industry News Stytch’s new offering enables B2B products and applications to build and deliver the enterprise-grade authentication requirements that their customers require, while maintaining a frictionless user experience to maximize conversion and adoption. Authentication is a key requirement for any B2B software application,

React to this headline:

Loading spinner

Stytch expands its platform to offer B2B authentication Read More »

Iranian Hackers Using New Windows Kernel Driver in Attacks

Iranian Hackers Using New Windows Kernel Driver in Attacks 23/05/2023 at 17:49 By Ionut Arghire Iranian threat actors use a Windows kernel driver called ‘Wintapix’ in attacks against Middle East targets. The post Iranian Hackers Using New Windows Kernel Driver in Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Iranian Hackers Using New Windows Kernel Driver in Attacks Read More »

Google Launches Bug Bounty Program for Mobile Applications

Google Launches Bug Bounty Program for Mobile Applications 23/05/2023 at 17:49 By Ionut Arghire Google introduces Mobile VRP bug bounty program for vulnerabilities in its mobile applications. The post Google Launches Bug Bounty Program for Mobile Applications appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Google Launches Bug Bounty Program for Mobile Applications Read More »

Rheinmetall Says Military Business Not Impacted by Ransomware Attack

Rheinmetall Says Military Business Not Impacted by Ransomware Attack 23/05/2023 at 17:49 By Eduard Kovacs Rheinmetall confirms being hit by Black Basta ransomware group, but says its military business is not affected. The post Rheinmetall Says Military Business Not Impacted by Ransomware Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Rheinmetall Says Military Business Not Impacted by Ransomware Attack Read More »

Red Hat Pushes New Tools to Secure Software Supply Chain

Red Hat Pushes New Tools to Secure Software Supply Chain 23/05/2023 at 17:49 By Ryan Naraine Red Hat rolls out a new suite of tools and services to help mitigate vulnerabilities across every stage of the modern software supply chain. The post Red Hat Pushes New Tools to Secure Software Supply Chain appeared first on

React to this headline:

Loading spinner

Red Hat Pushes New Tools to Secure Software Supply Chain Read More »

Scroll to Top