Red Hat’s replacement of CentOS with CentOS Stream has upset companies that depend on Linux as their server OS. CentOS Stream is a rolling release OS, which means it isn’t ideal from a reliability standpoint as it does not have a fixed update release schedule. However, shortly after Red Hat declared the discontinuation of CentOS, […]
Nov 13, 2023The Hacker News Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach, Asana, Monday, and Box empower marketing teams, agencies, freelancers, and subject matter experts to collaborate seamlessly on campaigns and marketing initiatives. These apps serve as the digital command centers for […]
Nov 13, 2023NewsroomCyber Crime / Dark Web Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink. The Royal Malaysia Police said the effort, which was carried out with assistance from the Australian Federal Police (AFP) and the U.S. Federal Bureau of Investigation (FBI) on November 6, 2023, was based […]
North Korea-linked APT Sapphire Sleet targets IT job seekers with bogus skills assessment portals Pierluigi Paganini November 13, 2023 North Korea-linked APT group Sapphire Sleet set up bogus skills assessment portals in attacks aimed at IT job seekers. The North Korea-linked APT group Sapphire Sleet (aka APT38, BlueNoroff, CageyChameleon, and CryptoCore) is considered a sub-group […]
What’s the deal with CherryBlos? CherryBlos is a rather interesting family of Android malware that can plunder your cryptocurrency accounts – with a little help from your photos. Wait. I’ve heard of hackers stealing photos before, but what do you mean by malware stealing cryptocurrency via my photos? How does it do that? Well, imagine […]
The Kaspersky Cyber Threat Intelligence team has unveiled crucial insights into the tactics, techniques and procedures (TTPs) employed by Asian Advanced Persistent Threat (APT) groups. The 370-page report, Modern Asian APT groups: Tactics, Techniques and Procedures, published today, is based on an examination of around one hundred cybersecurity incidents that unfolded across different regions globally, commencing […]
In 2021, RedHat decided to discontinue CentOS, a subscription-free alternative to RHEL that many companies, administrators, developers and end users rely on. CentOS provides an advantage to those needing to test platforms or development environments. CentOS’s end-of-support date is June 30, 2024. This means users must find an alternative distribution. There are several options to […]
Butler Couty is notifying the public of a data security incident where someone gained access to personally identifiable information. The county said federal authorities alerted them to suspicious activity on its computer network at the start of October. By the end of October, it determined there was unauthorized access to personally identifiable information related primarily […]
Nov 13, 2023NewsroomNational Security / Cyber Attack Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by two prominent Chinese nation-state hacking groups targeting 24 Cambodian government organizations. “This activity is believed to be part of a long-term espionage campaign,” Palo Alto Networks Unit 42 researchers said in a report last week. […]