Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National […]
Category: Cyber Security News
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials. “Outlaw […]
How SSL Misconfigurations Impact Your Attack Surface
When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity, and visibility to attackers […]
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking […]
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on […]
Malaysian Airport’s Cyber Disruption a Warning for Asia
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack. ​The […]
Google Brings End-to-End Encryption to Gmail
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail. ​The original article found on darkreading Read […]
As CISA Downsizes, Where Can Enterprises Get Support?
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential […]
Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks
Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities. ​The original article found on […]
Check Point Disputes Hacker’s Breach Claims
The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting […]