Uncategorized

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids 26/05/2023 at 10:38 By A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed. Google-owned threat intelligence firm Mandiant dubbed the malware COSMICENERGY, adding it was uploaded to a public malware scanning utility in December 2021 […]

React to this headline:

Loading spinner

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids Read More »

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances 26/05/2023 at 08:09 By Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been exploited to breach the company’s Email Security Gateway (ESG) appliances. The zero-day is being tracked as CVE-2023-2868 and has been described as

React to this headline:

Loading spinner

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances Read More »

Media industry cites lack of native security for public cloud issues

Media industry cites lack of native security for public cloud issues 25/05/2023 at 21:33 By A survey found that, while media and entertainment organizations are still relatively new to cloud storage, public cloud storage use is on the rise.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React

React to this headline:

Loading spinner

Media industry cites lack of native security for public cloud issues Read More »

Earning the “C” in CISO: Staying secure through economic turbulence

Earning the “C” in CISO: Staying secure through economic turbulence 25/05/2023 at 19:33 By With talk of a possible global recession this year, security professionals need to start anticipating the potential impacts to securing their organizations. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Earning the “C” in CISO: Staying secure through economic turbulence Read More »

Zyxel Issues Critical Security Patches for Firewall and VPN Products

Zyxel Issues Critical Security Patches for Firewall and VPN Products 25/05/2023 at 18:31 By Zyxel has released software updates to address two critical security flaws affecting select firewall and VPN products that could be abused by remote attackers to achieve code execution. Both the flaws – CVE-2023-33009 and CVE-2023-33010 – are buffer overflow vulnerabilities and are rated 9.8 out

React to this headline:

Loading spinner

Zyxel Issues Critical Security Patches for Firewall and VPN Products Read More »

Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry

Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry 25/05/2023 at 18:31 By A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS) attacks against the gaming industry. “The Dark Frost botnet, modeled after Gafgyt, QBot, Mirai, and other malware strains, has expanded to encompass hundreds of compromised devices,” Akamai security researcher Allen

React to this headline:

Loading spinner

Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry Read More »

Analyzing the NTC Vulkan Leak: What it Says About Russia’s Cyber Capabilities

Analyzing the NTC Vulkan Leak: What it Says About Russia’s Cyber Capabilities 25/05/2023 at 18:02 By Information disclosed in the leaked NTC Vulkan papers allows us to investigate the high probability of cooperation between the Russian private software development company and the Russian Ministry of Defense, namely, the GRU (Sandworm), and possibly others This article

React to this headline:

Loading spinner

Analyzing the NTC Vulkan Leak: What it Says About Russia’s Cyber Capabilities Read More »

New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government

New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government 25/05/2023 at 17:30 By An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted by a likely Iranian threat actor to breach the victim’s Microsoft Exchange Server with a “simple yet effective” backdoor dubbed PowerExchange. According to a new report from Fortinet

React to this headline:

Loading spinner

New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government Read More »

Cynet Protects Hospital From Lethal Infection

Cynet Protects Hospital From Lethal Infection 25/05/2023 at 17:30 By A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process of upgrading several expensive imaging systems that were still supported by Windows XP and Windows 7 machines. Cynet protections were in place on most of

React to this headline:

Loading spinner

Cynet Protects Hospital From Lethal Infection Read More »

IT-ISAC launches food and agriculture analysis center

IT-ISAC launches food and agriculture analysis center 25/05/2023 at 17:17 By The food and agriculture special interest group of the Information Technology-Information Sharing and Analysis Center is now its own analysis center. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

IT-ISAC launches food and agriculture analysis center Read More »

Trustwave DbProtect and MailMarshal Named Finalists for SC Media and SC Europe Awards

Trustwave DbProtect and MailMarshal Named Finalists for SC Media and SC Europe Awards 25/05/2023 at 16:18 By SC Media and SC Media Europe have named two of Trustwave’s premiere products, DbProtect and MailMarshal, as a finalist in several award categories the cybersecurity media outlet plans to announce this summer. This article is an excerpt from

React to this headline:

Loading spinner

Trustwave DbProtect and MailMarshal Named Finalists for SC Media and SC Europe Awards Read More »

Webinar with Guest Forrester: Browser Security New Approaches

Webinar with Guest Forrester: Browser Security New Approaches 25/05/2023 at 14:48 By In today’s digital landscape, browser security has become an increasingly pressing issue, making it essential for organizations to be aware of the latest threats to browser security. That’s why the Browser Security platform LayerX is hosting a webinar featuring guest speaker Paddy Harrington, a senior

React to this headline:

Loading spinner

Webinar with Guest Forrester: Browser Security New Approaches Read More »

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks 25/05/2023 at 14:48 By A Brazilian threat actor is targeting Portuguese financial institutions with information-stealing malware as part of a long-running campaign that commenced in 2021. “The attackers can steal credentials and exfiltrate users’ data and personal information, which can be leveraged for malicious activities

React to this headline:

Loading spinner

Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks Read More »

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code 25/05/2023 at 14:48 By The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families to strike Windows and Linux systems. “While the group doesn’t develop its own ransomware, it does utilize what appears to

React to this headline:

Loading spinner

Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code Read More »

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected 25/05/2023 at 12:19 By A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations in the U.S. and Guam without being detected, Microsoft and the “Five Eyes” nations said on Wednesday. The tech giant’s threat intelligence team is tracking the activity, which includes post-compromise credential

React to this headline:

Loading spinner

China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected Read More »

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains 25/05/2023 at 09:59 By Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations to secure their software supply chains. To that end, the search giant is making available the open source framework as an API for developers to integrate their

React to this headline:

Loading spinner

GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains Read More »

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware 25/05/2023 at 09:59 By The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its attacks targeting Israeli organizations. Agrius, also known as Pink Sandstorm (formerly Americium), has a track record of staging destructive data-wiping attacks aimed at Israel under the guise of ransomware

React to this headline:

Loading spinner

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware Read More »

Scroll to Top