Featured

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate 2024-03-15 at 13:10 By Kevin Townsend Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints. The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared […]

React to this headline:

Loading spinner

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate Read More »

Cyber Madness Bracket Challenge – Register to Play

Cyber Madness Bracket Challenge – Register to Play 2024-03-14 at 14:01 By Mike Lennon SecurityWeek’s Cyber Madness Bracket Challenge is a contest designed to bring the community together in a fun, competitive way through one of America’s top sporting events. The post Cyber Madness Bracket Challenge – Register to Play appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Cyber Madness Bracket Challenge – Register to Play Read More »

Major CPU, Software Vendors Impacted by New GhostRace Attack

Major CPU, Software Vendors Impacted by New GhostRace Attack 2024-03-13 at 12:33 By Eduard Kovacs CPU makers Intel, AMD, Arm and IBM, as well as software vendors, are impacted by a new speculative race condition (SRC) attack named GhostRace. The post Major CPU, Software Vendors Impacted by New GhostRace Attack appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Major CPU, Software Vendors Impacted by New GhostRace Attack Read More »

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure 2024-03-12 at 13:18 By Eduard Kovacs Vulnerabilities affecting a Nice Linear physical access product, including an exploited flaw, patched five years after their disclosure. The post Exploited Building Access System Vulnerability Patched 5 Years After Disclosure appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure Read More »

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure 2024-03-07 at 13:36 By Eduard Kovacs Critical TeamCity authentication bypass vulnerability CVE-2024-27198 exploited in the wild after details were disclosed. The post Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Critical TeamCity Vulnerability Exploitation Started Immediately After Disclosure Read More »

CrowdStrike to Acquire Flow Security

CrowdStrike to Acquire Flow Security 2024-03-06 at 05:03 By SecurityWeek News CrowdStrike says the acquisition of Flow Security will expand its cloud security capabilities with Data Security Posture Management. The post CrowdStrike to Acquire Flow Security appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

CrowdStrike to Acquire Flow Security Read More »

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking 2024-03-05 at 14:02 By Eduard Kovacs Vulnerabilities in a plugin for the Zeek network security monitoring tool can be exploited in attacks aimed at ICS environments. The post Zeek Security Tool Vulnerabilities Allow ICS Network Hacking appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Zeek Security Tool Vulnerabilities Allow ICS Network Hacking Read More »

Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers

Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers 2024-03-04 at 14:18 By Eduard Kovacs Researchers demonstrate that remote Stuxnet-style attacks are possible against many modern PLCs using web-based malware. The post Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers Read More »

Georgia’s Largest County Is Still Repairing Damage From January Cyberattack

Georgia’s Largest County Is Still Repairing Damage From January Cyberattack 2024-03-03 at 15:52 By Associated Press Georgia’s largest county is still repairing damage inflicted on its government offices by a cyberattack in January 2024. The post Georgia’s Largest County Is Still Repairing Damage From January Cyberattack appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Georgia’s Largest County Is Still Repairing Damage From January Cyberattack Read More »

Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case

Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case 2024-03-02 at 14:47 By Associated Press The Air National Guardsman accused of leaking highly classified military documents on social media is expected to plead guilty in his federal case. The post Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case

React to this headline:

Loading spinner

Pentagon Leak Suspect Jack Teixeira Expected to Plead Guilty in Federal Case Read More »

CISA Warns of Windows Streaming Service Vulnerability Exploitation

CISA Warns of Windows Streaming Service Vulnerability Exploitation 2024-03-01 at 16:01 By Ionut Arghire CISA says a high-severity elevation of privilege vulnerability in Microsoft Streaming Service is actively exploited in the wild. The post CISA Warns of Windows Streaming Service Vulnerability Exploitation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

CISA Warns of Windows Streaming Service Vulnerability Exploitation Read More »

Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack

Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack 2024-02-29 at 13:46 By Eduard Kovacs North Korean group Lazarus exploited AppLocker driver zero-day CVE-2024-21338 for privilege escalation in attacks involving FudModule rootkit. The post Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Windows Zero-Day Exploited by North Korean Hackers in Rootkit Attack Read More »

Intel Core Ultra vPro Platform Brings New Security Features

Intel Core Ultra vPro Platform Brings New Security Features 2024-02-28 at 14:52 By Eduard Kovacs Intel announces new and improved security features with the latest vPro platform and Core Ultra processors. The post Intel Core Ultra vPro Platform Brings New Security Features appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Intel Core Ultra vPro Platform Brings New Security Features Read More »

NIST Cybersecurity Framework 2.0 Officially Released

NIST Cybersecurity Framework 2.0 Officially Released 2024-02-27 at 13:53 By Eduard Kovacs NIST releases Cybersecurity Framework 2.0, the first major update since the creation of the CSF a decade ago. The post NIST Cybersecurity Framework 2.0 Officially Released appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

NIST Cybersecurity Framework 2.0 Officially Released Read More »

LockBit Ransomware Gang Resurfaces With New Site

LockBit Ransomware Gang Resurfaces With New Site 2024-02-26 at 15:56 By Ionut Arghire The LockBit ransomware operators announce a new leak site as they try to restore credibility after law enforcement takedown. The post LockBit Ransomware Gang Resurfaces With New Site appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

LockBit Ransomware Gang Resurfaces With New Site Read More »

‘SlashAndGrab’ ScreenConnect Vulnerability Widely Exploited for Malware Delivery

‘SlashAndGrab’ ScreenConnect Vulnerability Widely Exploited for Malware Delivery 2024-02-23 at 14:31 By Eduard Kovacs ConnectWise ScreenConnect vulnerability tracked as CVE-2024-1709 and SlashAndGrab exploited to deliver ransomware and other malware. The post ‘SlashAndGrab’ ScreenConnect Vulnerability Widely Exploited for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

‘SlashAndGrab’ ScreenConnect Vulnerability Widely Exploited for Malware Delivery Read More »

US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals

US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals 2024-02-22 at 15:03 By Eduard Kovacs The US is offering big rewards for information on LockBit cybercriminals as law enforcement claims to have identified some individuals. The post US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals appeared first on SecurityWeek. This

React to this headline:

Loading spinner

US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals Read More »

Apple Adds Post-Quantum Encryption to iMessage

Apple Adds Post-Quantum Encryption to iMessage 2024-02-21 at 16:46 By Eduard Kovacs Apple unveils PQ3, a new post-quantum cryptographic protocol for iMessage designed to protect communications against quantum computing attacks. The post Apple Adds Post-Quantum Encryption to iMessage appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Apple Adds Post-Quantum Encryption to iMessage Read More »

Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation

Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation 2024-02-20 at 14:16 By Eduard Kovacs The LockBit ransomware operation has been severely disrupted by an international law enforcement operation resulting in server seizures and arrests. The post Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Law Enforcement Hacks LockBit Ransomware, Delivers Major Blow to Operation Read More »

Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed

Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed 2024-02-16 at 17:01 By Kevin Townsend The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between NSO and the telecom regulator of Ghana. The post Mysterious ‘MMS Fingerprint’ Hack Used

React to this headline:

Loading spinner

Mysterious ‘MMS Fingerprint’ Hack Used by Spyware Firm NSO Group Revealed Read More »

Buy Me A Coffee
Thank you for visiting!