In a new cybersecurity threat, the notorious TA505 hacker group has been seen employing a cunning phishing campaign. The campaign uses a Remote Management System (RMS) executable to target users in specific regions. The TA505 hacker group uses this technique in a hacking campaign to mimic banned applications, such as ExpressVPN, WeChat, and Skype, in […]
A novel and sophisticated backdoor malware named Deadglyph was seen used in a cyberespionage campaign targeting a government agency in the Middle East. The malware is attributed to the Stealth Falcon hacking group, which is infamous for targeting activists, journalists, and dissidents. Deadglyph infection method While the exact delivery method is currently unknown, it is […]
Hong Kong-based cryptocurrency exchange platform, CoinEx, has seen the loss of US$70 million in cryptocurrency following a cyber attack. The cryptocurrency exchange platform made users aware of the cyber attack on September 12 via a post on social media site X (formerly Twitter). In the post, the company explained that the cyber attack was discovered after its […]
Today, DevOps is seen as a crucial way to reduce application vulnerability and increase speed to market by baking security into the development process.While the benefits are undisputed, the challenge to doing DevSecOps well lies in the ability to successfully integrate the previously distinct development and security structures within an organisation, talent shortages and effectively […]
- 1
- 2