SecurityTicks

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin 01/06/2023 at 19:03 By Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime actor known as XE Group. According to Menlo Security, which pieced together the information from different online sources, “Nguyen Huu Tai, who also […]

React to this headline:

Loading spinner

Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin Read More »

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware 01/06/2023 at 19:03 By A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. “The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with

React to this headline:

Loading spinner

New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware Read More »

‘NoEscape’ Ransomware-as-a-Service (RaaS)

‘NoEscape’ Ransomware-as-a-Service (RaaS) 01/06/2023 at 18:32 By cybleinc CRIL analyzes the newly advertised ‘NoEscape’ Ransomware-as-a-Service (RaaS) program that claims to facilitate sophisticated extortion operations using an advanced, indigenously developed ransomware strain. The post ‘NoEscape’ Ransomware-as-a-Service (RaaS) appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

‘NoEscape’ Ransomware-as-a-Service (RaaS) Read More »

Nozomi and Cynalytica team to deliver security solutions to OT & IoT environments

Nozomi and Cynalytica team to deliver security solutions to OT & IoT environments 01/06/2023 at 18:32 By Industry News Nozomi Networks and Cynalytica have unveiled they have partnered to provide a visibility, monitoring and threat detection solution that encompasses both TCP/IP-based and non-IP based serial bus and analog connections found in OT and IoT environments.

React to this headline:

Loading spinner

Nozomi and Cynalytica team to deliver security solutions to OT & IoT environments Read More »

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers! 01/06/2023 at 18:18 By Zeljka Zorz A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to grab corporate data. “[The vulnerability] could lead to escalated privileges and potential unauthorized access to the environment,” the company warned

React to this headline:

Loading spinner

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers! Read More »

FTC: Ring failed to stop hackers from accessing users’ cameras

FTC: Ring failed to stop hackers from accessing users’ cameras 01/06/2023 at 18:18 By Under the proposed FTC order, Ring is prohibited from profiting from unlawfully accessing consumers videos and must pay $5.8 million in consumer refunds. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

FTC: Ring failed to stop hackers from accessing users’ cameras Read More »

CYTRACOM improves efficiency for MSPs with ControlOne platform updates

CYTRACOM improves efficiency for MSPs with ControlOne platform updates 01/06/2023 at 18:04 By Industry News CYTRACOM announces a significant update to its ControlOne platform, enabling MSPs to prevent managed clients from evading security requirements and create a passwordless experience for end-users. Managed users are now always on the virtual corporate network, secured by unified global

React to this headline:

Loading spinner

CYTRACOM improves efficiency for MSPs with ControlOne platform updates Read More »

Russia Blames US Intelligence for iOS Zero-Click Attacks

Russia Blames US Intelligence for iOS Zero-Click Attacks 01/06/2023 at 17:48 By Eduard Kovacs Kaspersky said its corporate network has been targeted with a zero-click iOS exploit, just as Russia’s FSB said iPhones have been targeted by US intelligence. The post Russia Blames US Intelligence for iOS Zero-Click Attacks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Russia Blames US Intelligence for iOS Zero-Click Attacks Read More »

Toyota Discloses New Data Breach Involving Vehicle, Customer Information

Toyota Discloses New Data Breach Involving Vehicle, Customer Information 01/06/2023 at 17:48 By Ionut Arghire Toyota says improper cloud configurations exposed vehicle and customer information in Japan and overseas for years. The post Toyota Discloses New Data Breach Involving Vehicle, Customer Information appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Toyota Discloses New Data Breach Involving Vehicle, Customer Information Read More »

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads 01/06/2023 at 17:32 By Industry News Uptycs has integrated with Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes security data from across AWS environments, SaaS providers, on-premises, and cloud sources into a purpose-built data lake. Amazon Security Lake manages

React to this headline:

Loading spinner

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads Read More »

7,500 fraudulent pharmaceutical listings were taken down in 2022

7,500 fraudulent pharmaceutical listings were taken down in 2022 01/06/2023 at 17:32 By Pharmaceutical fraud targeting patients and organizations was targeted in a recent report by BrandShield and the Pharmaceutical Security Institute.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

7,500 fraudulent pharmaceutical listings were taken down in 2022 Read More »

Code42 names Wayne Jackson to its Board of Directors

Code42 names Wayne Jackson to its Board of Directors 01/06/2023 at 17:07 By Industry News Code42 Software has announced the appointment of Wayne Jackson to its board of directors. Jackson boasts an impressive career in enterprise security software and currently serves as the CEO of Sonatype. “We are pleased to welcome Wayne Jackson to Code42’s

React to this headline:

Loading spinner

Code42 names Wayne Jackson to its Board of Directors Read More »

Safe Security unveils Cyber Risk Cloud of Clouds platform

Safe Security unveils Cyber Risk Cloud of Clouds platform 01/06/2023 at 16:42 By Industry News Safe Security announced Cyber Risk Cloud of Clouds for predicting and preventing cyber breaches. In contrast to the rest of the industry that takes a reactive approach, SAFE’s Cyber Risk Cloud of Clouds enables organizations to make informed and predictive

React to this headline:

Loading spinner

Safe Security unveils Cyber Risk Cloud of Clouds platform Read More »

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology 01/06/2023 at 16:18 By Eduard Kovacs Cisco is in the process of acquiring email security firm Armorblox for its predictive and generative artificial intelligence (AI) technology. The post Cisco Acquiring Armorblox for Predictive and Generative AI Technology appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cisco Acquiring Armorblox for Predictive and Generative AI Technology Read More »

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection 01/06/2023 at 16:14 By Industry News Stellar Cyber announced support for the Amazon Security Lake from Amazon Web Services (AWS). Organizations using the Stellar Cyber Open XDR Platform and AWS can directly ingest data from the Amazon Security Lake into Stellar

React to this headline:

Loading spinner

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection Read More »

How organizations can protect against phishing campaigns

How organizations can protect against phishing campaigns 01/06/2023 at 16:14 By With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

How organizations can protect against phishing campaigns Read More »

Threat actors can exfiltrate data from Google Drive without leaving a trace

Threat actors can exfiltrate data from Google Drive without leaving a trace 01/06/2023 at 15:43 By Zeljka Zorz Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or insider, Mitiga researchers say. A problem for digital forensic analysts and incident

React to this headline:

Loading spinner

Threat actors can exfiltrate data from Google Drive without leaving a trace Read More »

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection 01/06/2023 at 15:43 By Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code to sidestep detection by application security tools. “It may be the first supply chain attack to take advantage of the fact that Python

React to this headline:

Loading spinner

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection Read More »

How Wazuh Improves IT Hygiene for Cyber Security Resilience

How Wazuh Improves IT Hygiene for Cyber Security Resilience 01/06/2023 at 15:43 By IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running properly. Good IT hygiene includes vulnerability management, security configuration assessments, maintaining asset and system inventories, and comprehensive visibility into the activities occurring in

React to this headline:

Loading spinner

How Wazuh Improves IT Hygiene for Cyber Security Resilience Read More »

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks 01/06/2023 at 15:19 By Eduard Kovacs Critical authentication bypass and high-severity command injection vulnerabilities have been patched in Moxa’s MXsecurity product. The post Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks Read More »

Scroll to Top