December 2024

Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access

Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access 2024-12-05 at 17:30 By Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with an arbitrary file read zero-day, granting an attacker the ability to access files from susceptible instances. The critical vulnerability […]

React to this headline:

Loading spinner

Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access Read More »

Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers

Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers 2024-12-05 at 17:30 By Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on a large scale. The operation, led by German authorities, has resulted in the seizure of more than 50 servers associated with the service

React to this headline:

Loading spinner

Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers Read More »

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here! 2024-12-05 at 17:30 By Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the

React to this headline:

Loading spinner

Want to Grow Vulnerability Management into Exposure Management? Start Here! Read More »

FBI warns texts between Android and Apple phones pose cybersecurity risk — here’s what to do instead

FBI warns texts between Android and Apple phones pose cybersecurity risk — here’s what to do instead 2024-12-05 at 17:01 By Brooke Kato Malicious actors suspected to be from China, nicknamed Salt Typhoon, hacked into telecommunication companies such as AT&T, T-Mobile and Verizon. This article is an excerpt from Latest Technology News and Product Reviews

React to this headline:

Loading spinner

FBI warns texts between Android and Apple phones pose cybersecurity risk — here’s what to do instead Read More »

Mitek Digital Fraud Defender combats AI generated fraud

Mitek Digital Fraud Defender combats AI generated fraud 2024-12-05 at 16:32 By Industry News Mitek announced Digital Fraud Defender (DFD), an advanced, multi-layered solution to safeguard digital identity verification processes against sophisticated AI-enabled fraud tactics. Designed for financial institutions, fintech, online gaming providers, and enterprises requiring remote identity verification, the new suite addresses the urgent

React to this headline:

Loading spinner

Mitek Digital Fraud Defender combats AI generated fraud Read More »

Mitel MiCollab zero-day and PoC exploit unveiled

Mitel MiCollab zero-day and PoC exploit unveiled 2024-12-05 at 16:32 By Zeljka Zorz A zero-day vulnerability in the Mitel MiCollab enterprise collaboration suite can be exploited to read files containing sensitive data, watchTowr researcher Sonny Macdonald has disclosed, and followed up by releasing a proof-of-concept (PoC) exploit that chains together this zero-day file read vulnerability

React to this headline:

Loading spinner

Mitel MiCollab zero-day and PoC exploit unveiled Read More »

Rockstar 2FA Phishing Service Targets Microsoft 365 Accounts

Rockstar 2FA Phishing Service Targets Microsoft 365 Accounts 2024-12-05 at 16:32 View original post at vpnMentor A new phishing-as-a-service (PhaaS) platform, known as Rockstar 2FA, is enabling adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials and bypass multifactor authentication (MFA). Specifically, AiTM phishing is a technique that uses specialized tools to allow a threat actor

React to this headline:

Loading spinner

Rockstar 2FA Phishing Service Targets Microsoft 365 Accounts Read More »

Bitdefender GravityZone XDR enhancements protect business data stored in the cloud

Bitdefender GravityZone XDR enhancements protect business data stored in the cloud 2024-12-05 at 16:18 By Industry News Bitdefender announced enhancements to its GravityZone XDR platform with the addition of its new Business Applications sensor, designed to protect corporate data hosted and stored in cloud-based productivity and collaboration applications. The sensor will initially support Atlassian cloud

React to this headline:

Loading spinner

Bitdefender GravityZone XDR enhancements protect business data stored in the cloud Read More »

Wish there was a benchmark for ML safety? Allow us to AILuminate you…

Wish there was a benchmark for ML safety? Allow us to AILuminate you… 2024-12-05 at 16:03 By Thomas Claburn Very much a 1.0 – but it’s a solid start MLCommons, an industry-led AI consortium, on Wednesday introduced AILuminate – a benchmark for assessing the safety of large language models in products.… This article is an

React to this headline:

Loading spinner

Wish there was a benchmark for ML safety? Allow us to AILuminate you… Read More »

Trustwave Named a Major Player in IDC MarketScape: Worldwide Cloud Security Services in the AI Era 2024–2025 Vendor Assessment

Trustwave Named a Major Player in IDC MarketScape: Worldwide Cloud Security Services in the AI Era 2024–2025 Vendor Assessment 2024-12-05 at 16:02 By IDC has positioned Trustwave as a Major Player in the just released IDC MarketScape Worldwide Cloud Security Services in the AI Era 2024–2025 Vendor Assessment (IDC #US52048124e, November 2024) for its comprehensive set of

React to this headline:

Loading spinner

Trustwave Named a Major Player in IDC MarketScape: Worldwide Cloud Security Services in the AI Era 2024–2025 Vendor Assessment Read More »

Netography introduces AI-powered ransomware detection capabilities

Netography introduces AI-powered ransomware detection capabilities 2024-12-05 at 15:49 By Industry News Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion customers to close the network observability and security gaps caused by limitations in their

React to this headline:

Loading spinner

Netography introduces AI-powered ransomware detection capabilities Read More »

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor 2024-12-05 at 15:49 By A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to facilitate long-term surveillance operations targeting Tibetans and Uyghurs. “Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor

React to this headline:

Loading spinner

Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor Read More »

Vodafone and Three permitted to tie the knot – if they promise to behave

Vodafone and Three permitted to tie the knot – if they promise to behave 2024-12-05 at 15:33 By Dan Robinson Merger will create third large operator in UK mobile market Vodafone and Three’s proposed merger has been cleared by the UK’s competition watchdog, as long as the pair commit to certain conditions. The move will

React to this headline:

Loading spinner

Vodafone and Three permitted to tie the knot – if they promise to behave Read More »

Middesk Address Risk Insights strengthens onboarding processes

Middesk Address Risk Insights strengthens onboarding processes 2024-12-05 at 15:32 By Industry News Middesk introduced Address Risk Insights, a critical new addition to its core Know Your Business (KYB) product Verify and its recently introduced risk scoring Signal product. A first for the KYB space, Address Risk Insights helps companies assess the risk of a

React to this headline:

Loading spinner

Middesk Address Risk Insights strengthens onboarding processes Read More »

British hospitals hit by cyberattacks still battling to get systems back online

British hospitals hit by cyberattacks still battling to get systems back online 2024-12-05 at 14:35 By Connor Jones Children’s hospital and cardiac unit say criminals broke in via shared ‘digital gateway service’ Both National Health Service trusts that oversee the various hospitals hit by separate cyberattacks last week have confirmed they’re still in the process

React to this headline:

Loading spinner

British hospitals hit by cyberattacks still battling to get systems back online Read More »

8+ US telcos compromised, FBI advises Americans to use encrypted communications

8+ US telcos compromised, FBI advises Americans to use encrypted communications 2024-12-05 at 14:24 By Zeljka Zorz FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks and systems

React to this headline:

Loading spinner

8+ US telcos compromised, FBI advises Americans to use encrypted communications Read More »

Want to Grow Vulnerability Management into Exposure Management? Start Here!

Want to Grow Vulnerability Management into Exposure Management? Start Here! 2024-12-05 at 14:24 By Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to help organizations identify and address potential security issues before they become serious problems. Yet, in recent years, the

React to this headline:

Loading spinner

Want to Grow Vulnerability Management into Exposure Management? Start Here! Read More »

SurePath AI Discover classifies AI use by intent and detects sensitive data violations

SurePath AI Discover classifies AI use by intent and detects sensitive data violations 2024-12-05 at 13:45 By Industry News SurePath AI launched SurePath AI Discover, a new offering that provides visibility into a company’s employee use of public AI services. By classifying AI use by intent and identifying sensitive data violations, companies can better understand

React to this headline:

Loading spinner

SurePath AI Discover classifies AI use by intent and detects sensitive data violations Read More »

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers 2024-12-05 at 13:31 By A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion. According to Broadcom-owned Symantec, the first evidence of the malicious activity was detected on April 11, 2024 and continued until August.

React to this headline:

Loading spinner

Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers Read More »

Scroll to Top