Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities. ​The original article found on […]
Check Point Disputes Hacker’s Breach Claims
The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting […]
Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
The bill will allow Japan to implement safeguards and strategies that have been in use by other countries for some time. ​The original article found […]
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners. Cloud security firm Wiz said the […]
Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform
On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in […]
Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing
A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication […]
Lazarus APT Jumps on ClickFix Bandwagon in Recent Attacks
A continuation of the North Korean nation-state threat’s campaign against employment seekers uses the social engineering attack to target CeFi organizations with the GolangGhost backdoor. […]
Google ‘ImageRunner’ Bug Enabled Privilege Escalation
Tenable released details of a Google Cloud Run flaw that prior to remediation allowed a threat actor to escalate privileges. ​The original article found on […]
FDA’s Critical Role in Keeping Medical Devices Secure
The FDA’s regulations and guidance aim to strike a balance between ensuring rigorous oversight and enabling manufacturers to act swiftly when vulnerabilities are discovered. ​The […]
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, […]