OAuth Apps Used to Automate BEC and Cryptomining Attacks

Attackers target user accounts without robust authentication measures, creating new OAuth apps with high privileges to ...

Widespread Security Flaws Blamed for PSNI Data Breach

The most significant data breach that has ever occurred in the history of UK policing was due to force-wide security ...

Cloud Engineer Wreaks Havoc on Bank’s Network After Firing

The engineer deployed malware, deleted code repositories, and emailed himself proprietary bank code in retaliation for ...

Microsoft’s Final 2023 Patch Tuesday: 33 Flaws Fixed, Including 4 Critical

Dec 13, 2023NewsroomPatch Tuesday / Windows Security Microsoft released its final set of Patch Tuesday updates for ...

Unveiling the Cyber Threats to Healthcare: Beyond the Myths

Let’s begin with a thought-provoking question: among a credit card number, a social security number, and an ...

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign

Dec 12, 2023NewsroomCyber Espionage / Malware The Russian nation-state threat actor known as APT28 has been observed ...

Over 1,450 pfSense Servers Exposed to RCE Attacks via Bug Chain

Around 1,450 instances of pfSense, an open-source firewall and router software, are vulnerable to command injection and ...

Threat Actor Targets Recruiters With Malware

Proofpoint has warned recruiters of a skilled threat actor targeting them with emails designed to deploy malware. TA4557 ...

1 442 443 444 445 446 447 448 449 450 451 452 657