Month: December 2024

Fortinet Acquires Perception Point Reportedly for $100 Million

Fortinet on Wednesday announced the acquisition of Israeli security company Perception Point. Perception Point provides solutions for securing email, collaboration platforms, web browsers, and cloud storage applications, which enable Fortinet to expand and enhance its offering.  Fortinet said it acquired Perception Point for features such as advanced threat detection, browser security, image and file scanning, […]

Explore More

The Ghost of Christmas Past – AI’s Past, Present and Future

The speed at which Artificial Intelligence (AI) continues to expand is unprecedented, particularly since GenAI catapulted into the market in 2022. Today AI works at a much faster pace than human output, which is what makes this technology so appealing to leaders who are focused on streamlining operations, productivity gains and cost efficiencies. But for […]

Explore More

Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement

For years, Chinese law enforcement has been using a lawful surveillance tool to collect extensive data from Android devices, cybersecurity firm Lookout reports. Dubbed EagleMsgSpy and created by a Chinese software development company, the tool has been in use since at least 2017, and has only been deployed through physical access to the victims’ devices. […]

Explore More

Microsoft MFA Bypassed via AuthQuake Attack 

Non-human identity management firm Oasis Security has disclosed the details of an attack that allowed its researchers to bypass Microsoft’s multi-factor authentication (MFA) implementation. The attack method, dubbed AuthQuake, was reported to Microsoft in late June and a temporary fix was rolled out a few days later. The tech giant released a permanent fix in […]

Explore More

27 DDoS Attack Services Taken Down by Law Enforcement

An international law enforcement operation targeting distributed denial-of-service (DDoS) services has led to the takedown of 27 websites and the arrest of three suspects. Referred to as booter or stresser services, these platforms allowed miscreants to launch DDoS attacks against websites and other web-based services to render them unusable. On Wednesday, Europol announced the takedown […]

Explore More

Cleo Patches Exploited Flaw as Security Firms Detail Malware Pushed in Attacks

Enterprise software maker Cleo on Wednesday released updates for several file transfer tools to patch an actively exploited vulnerability. In the meantime, security firms are conducting an analysis of the flaw, as well as the malware delivered by threat actors in the observed attacks. An improperly patched vulnerability affecting Cleo’s Harmony, VLTrader, and LexiCom file […]

Explore More

Hunk Companion, WP Query Console Vulnerabilities Chained to Hack WordPress Sites

Threat actors have been exploiting two vulnerabilities in the Hunk Companion and WP Query Console WordPress plugins to gain persistent backdoor access to vulnerable websites, WPScan reports. Hunk Companion, a website development plugin designed to boost the functionality of ThemeHunk WordPress themes, is vulnerable to a missing capability check that allows attackers to install and […]

Explore More

Apple Pushes Major iOS, macOS Security Updates

It’s Patch Wednesday in Cupertino. Apple’s security response team pushed out major security updates to fix security flaws across the iOS and macOS ecosystems, warning of risks of data leakage, sandbox escapes and code execution attacks. The company called immediate attention to its iOS 18.2 and macOS Sequoia 15.2 patches, warning of flaws in the […]

Explore More

No Doughnuts Today? Cyberattack Puts Krispy Kreme in a Sticky Situation

Donut and coffee retail chain Krispy Kreme on Wednesday confirmed a cyberattack led to operational disruptions of operations, including its online ordering system. The North Carolina company posted a message on its website referencing a “cybersecurity incident” but did not share any additional details. The incident has all the hallmarks of a data-extortion ransomware attack […]

Explore More

BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections

Academic researchers have devised a new attack that relies on cheap equipment to provide false information to the system processor during startup and break AMD’s latest trusted execution environment guarantees. Called BadRAM, the new attack uses $10 off-the-shelf equipment to break AMD SEV-SNP (Secure Encrypted Virtualization-Secure Nested Paging), cutting-edge memory integrity protections that rely on […]

Explore More

Let’s Work Together!
Just Drop Us a line - [email protected]

Subscribe to our Newsletter

copyright 2024 by Digital Creations LLC