Cybersecurity Blog
OAuth Apps Used to Automate BEC and Cryptomining Attacks
Attackers target user accounts without robust authentication measures, creating new OAuth apps with high privileges to ...
Widespread Security Flaws Blamed for PSNI Data Breach
The most significant data breach that has ever occurred in the history of UK policing was due to force-wide security ...
Cloud Engineer Wreaks Havoc on Bank’s Network After Firing
The engineer deployed malware, deleted code repositories, and emailed himself proprietary bank code in retaliation for ...
Microsoft’s Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical
Dec 13, 2023NewsroomPatch Tuesday / Windows Security Microsoft released its final set of Patch Tuesday updates for ...
Unveiling the Cyber Threats to Healthcare: Beyond the Myths
Let’s begin with a thought-provoking question: among a credit card number, a social security number, and an ...
Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign
Dec 12, 2023NewsroomCyber Espionage / Malware The Russian nation-state threat actor known as APT28 has been observed ...
Over 1,450 pfSense Servers Exposed to RCE Attacks via Bug Chain
Around 1,450 instances of pfSense, an open-source firewall and router software, are vulnerable to command injection and ...
Threat Actor Targets Recruiters With Malware
Proofpoint has warned recruiters of a skilled threat actor targeting them with emails designed to deploy malware. TA4557 ...