FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine

Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

SOAR Into More Integrated Cybersecurity

By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on SOAR Into More Integrated Cybersecurity

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Trojan Source attack method allows hiding flaws in source code

5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest but still exceptionally popular forms of attack. In this attack, a hacker […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on 5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.

AbstractEmu, a new Android malware with rooting capabilities

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on AbstractEmu, a new Android malware with rooting capabilities

Ranzy Locker ransomware hit tens of US companies in 2021

The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had already compromised tens of US companies. The FBI published a flash alert […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Ranzy Locker ransomware hit tens of US companies in 2021

The Top 6 Cyber Attacks Of 2021 So Far

By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend shows no signs of slowing down. To add salt (no pun intended) […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on The Top 6 Cyber Attacks Of 2021 So Far

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X