Browsing Category
Cybersecurity
CISA Adds Palo Alto Networks’ PAN-OS Vulnerability to Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Palo Alto Networks PAN-OS to its…
Air-Gap Attack Exploits Gyroscope Ultrasonic Covert Channel to Leak Data
A new data exfiltration technique has been discovered, which uses a covert ultrasonic channel to leak sensitive information from…
Counterfeit Android Devices Revealed to Contain Backdoor Designed to Hack…
A team of mobile security researchers has discovered backdoors in the system partition of some budget Android device models that…
As The Pandemic Persists, Hospitals Face New Cyber Vulnerabilities
By Jack Chapman, VP of Threat Intelligence, Egress Software
Regardless of where you are, local hospitals are a vital part of…
Media Firms Twice as Exposed to Compromise
The percentage of media companies susceptible to compromise is double the figure across all other sectors, according to a new…
Configuration Errors to Blame for 80% of Ransomware
The vast majority (80%) of ransomware attacks can be traced back to common configuration errors in software and devices, according…
FBI: Beware Residential IPs Hiding Credential Stuffing
Cyber-criminals are increasingly hijacking home IP addresses to hide credential stuffing activity and increase their chances of…
CEO of Blacklisted Israeli Spyware Maker NSO Steps Down
The CEO of NSO Group, the Israeli company behind the Pegasus spyware, will step down as part of a restructuring plan that will…
Apes Gone Phishing – Cyber Defense Magazine
BAYC Attack Leads to $250,000 Loss
By Ronghui Gu, CEO and cofounder at CertiK
NFTs are one of the most headline-grabbing…
Escanor RAT Malware Deployed Via Microsoft Office and PDF Documents
A new remote administration tool (RAT) weaponizing Microsoft Office and Adobe PDF documents to deliver malicious code was spotted…