Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group is a China-linked cyber espionage group that has […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the Technical University of Darmstadt, Germany, have discovered a privacy issue […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Boffins found a bug in Apple AirDrop that could leak users’ personal info

Patchstack Protects The Web With Community

By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Patchstack Protects The Web With Community

Gap of The Red Team from The Leak of Fireeye

Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , | Comments Off on Gap of The Red Team from The Leak of Fireeye

How Zero Trust Networks Can Help Curb IT Burnout

By Stephen Helm, Product Marketing Manager, WatchGuard Technologies Last year was a challenging year for IT teams, and tech workers will continue to feel the mounting burden of maintaining business […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on How Zero Trust Networks Can Help Curb IT Burnout

Microsoft fixes 2 critical Exchange Server flaws reported by the NSA

Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Microsoft fixes 2 critical Exchange Server flaws reported by the NSA

Malware Evasion Techniques

By Stas Gaivoronskii, Malware Analyst at ANY.RUN Cybercriminals create new ways to make malware invisible for detection. They hide malicious indicators and behavior during analysis. Researchers need to know about […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Malware Evasion Techniques

Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , | Comments Off on Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

This man was planning to kill 70% of Internet in a bomb attack against AWS

The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28), […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , | Comments Off on This man was planning to kill 70% of Internet in a bomb attack against AWS

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

Protecting Human Rights in The Era of Cyber Information Warfare

By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current […]

Posted in Cyber Security News | Tagged , , , , , , , , , , | Comments Off on Protecting Human Rights in The Era of Cyber Information Warfare

Rise of BYOD Once Again

By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Rise of BYOD Once Again

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on 4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live […]

Posted in Cyber Security News | Tagged , , , , , , , , , | Comments Off on Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X