logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Archive by category "Cybersecurity Compliance"

Page 2

Read more

Palo Alto Networks Warns About Critical Zero-Day in PAN-OS

April 12, 2024 / 46 / 0
[ad_1] A critical zero-day vulnerability in Palo Alto Networks’ PAN-OS software, used in its GlobalProtect gateways, is being exploited in the wild, and no patches are available yet. Palo Alto Networks issued an alert about the flaw on April 12, 2024, thanking cybersecurity firm Volexity... Continue reading
Read more

Raspberry Robin Distributed Through Windows Script Files

April 12, 2024 / 44 / 0
[ad_1] Threat actors distributing Raspberry Robin now use Windows Script Files (WSF) to spread the worm alongside other methods, such as USB drives. HP Threat Research identified new campaigns starting in March 2024 in which Raspberry Robin was spread through highly obfuscated Windows Script Files,... Continue reading
Read more

New Android Espionage Campaign Spotted in India and Pakistan

April 12, 2024 / 51 / 0
[ad_1] Researchers from cybersecurity firm ESET found that a recent cyber espionage campaign using the open-source malware XploitSPY targeted Android users in India and Pakistan. The campaign, which ESET named ‘eXotic Visit,’ was active between November 2021 and the end of 2023. ESET researchers observed... Continue reading
Read more

Data Breach Exposes 300k Taxi Passengers’ Information

April 11, 2024 / 51 / 0
[ad_1] Cybersecurity researchers have uncovered a significant data exposure concerning nearly 300,000 taxi passengers in the UK and Ireland.  Jeremiah Fowler, in collaboration with vpnMentor, found a non-password-protected database containing personal details such as names, phone numbers and email addresses. These records, belonging to Dublin-based... Continue reading
Read more

Apple Boosts Spyware Alerts For Mercenary Attacks

April 11, 2024 / 55 / 0
[ad_1] Apple has updated its documentation related to its warning system for mercenary spyware threats, now specifying that it alerts users when they may have been individually targeted by such attacks. The revision points out companies like NSO Group, known for developing surveillance tools like... Continue reading
Read more

Threat Actors Game GitHub Search to Spread Malware

April 11, 2024 / 68 / 0
[ad_1] Threat actors are going to great lengths to ensure that malicious code hidden in legitimate-looking GitHub repositories is used by as many developers as possible, Checkmarx has warned. The security vendor’s research engineer, Yehuda Gelb, described a number of techniques deployed in a recent... Continue reading
Read more

Windows: New ‘BatBadBut’ Rust Vulnerability Given Highest CVSS Score

April 11, 2024 / 41 / 0
[ad_1] A critical vulnerability in the Rust standard library could be exploited to target Windows systems and perform command injection attacks. The flaw was discovered by a security engineer from Flatt Security known as RyotaK. They named it BatBadBut, reported it to the CERT Coordination... Continue reading
Read more

Women Experience Exclusion Twice as Often as Men in Cybersecurity

April 11, 2024 / 40 / 0
[ad_1] A new report has found workplace experiences of women are dramatically worse than that of their male counterparts including in areas of respect and exclusion. These findings came from the first annual State of Inclusion Benchmark in Cybersecurity assessment, which has been published by... Continue reading
Read more

LG TV Vulnerabilities Expose 91,000 Devices

April 10, 2024 / 72 / 0
[ad_1] New vulnerabilities were discovered in LG TVs that would allow unauthorized access to the devices’ root systems, potentially exposing thousands of devices worldwide.  The discovery, made as part of Bitdefender’s ongoing audit of popular Internet of Things (IoT) hardware, focuses on vulnerabilities within WebOS versions... Continue reading
Read more

Rhadamanthys Malware Deployed By TA547 Against German Targets

April 10, 2024 / 53 / 0
[ad_1] The threat actor TA547 has been observed targeting German organizations with the known stealer Rhadamanthys. According to a recent report from Proofpoint, this is the first time this threat actor has been associated with such activity.  What’s particularly intriguing according to the researchers is... Continue reading
Next Page »

Search