Cybersecurity

Top 5 Marketing Tech SaaS Security Challenges

Nov 13, 2023The Hacker News Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach, Asana, Monday, and Box empower marketing teams, agencies, freelancers, and subject matter experts to collaborate seamlessly on campaigns and marketing initiatives. These apps serve as the digital command centers for […]

Cybersecurity

Major Phishing-as-a-Service Syndicate ‘BulletProofLink’ Dismantled by Malaysian Authorities

Nov 13, 2023NewsroomCyber Crime / Dark Web Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink. The Royal Malaysia Police said the effort, which was carried out with assistance from the Australian Federal Police (AFP) and the U.S. Federal Bureau of Investigation (FBI) on November 6, 2023, was based […]

Cybersecurity

North Korea-linked APT Sapphire Sleet targets IT job seekers

North Korea-linked APT Sapphire Sleet targets IT job seekers with bogus skills assessment portals Pierluigi Paganini November 13, 2023 North Korea-linked APT group Sapphire Sleet set up bogus skills assessment portals in attacks aimed at IT job seekers. The North Korea-linked APT group Sapphire Sleet (aka APT38, BlueNoroff, CageyChameleon, and CryptoCore) is considered a sub-group […]

Cybersecurity

CherryBlos, the malware that steals cryptocurrency via your photos – what you need to know

What’s the deal with CherryBlos? CherryBlos is a rather interesting family of Android malware that can plunder your cryptocurrency accounts – with a little help from your photos. Wait. I’ve heard of hackers stealing photos before, but what do you mean by malware stealing cryptocurrency via my photos? How does it do that? Well, imagine […]

Cybersecurity

Signature Techniques of Asian APT Groups Revealed

The Kaspersky Cyber Threat Intelligence team has unveiled crucial insights into the tactics, techniques and procedures (TTPs) employed by Asian Advanced Persistent Threat (APT) groups. The 370-page report, Modern Asian APT groups: Tactics, Techniques and Procedures, published today, is based on an examination of around one hundred cybersecurity incidents that unfolded across different regions globally, commencing […]

Data Center

8 Linux distributions to replace CentOS | TechTarget

In 2021, RedHat decided to discontinue CentOS, a subscription-free alternative to RHEL that many companies, administrators, developers and end users rely on. CentOS provides an advantage to those needing to test platforms or development environments. CentOS’s end-of-support date is June 30, 2024. This means users must find an alternative distribution. There are several options to […]

Cybersecurity

Personal information impacted in breach of computer network, Butler County says

Butler Couty is notifying the public of a data security incident where someone gained access to personally identifiable information. The county said federal authorities alerted them to suspicious activity on its computer network at the start of October. By the end of October, it determined there was unauthorized access to personally identifiable information related primarily […]

Cybersecurity

CISA Now Flagging Vulnerabilities, Misconfigurations Exploited by Ransomware

The US cybersecurity agency CISA is stepping up its efforts to prevent ransomware by making it easier for organizations to learn about vulnerabilities and misconfigurations exploited in these attacks. As part of its Ransomware Vulnerability Warning Pilot (RVWP) program launched in March, the agency has released two new resources to help organizations identify and eliminate […]