What We Can Learn from Major Cloud Cyberattacks
Analysis of six major cloud incidents shows how some common mistakes can lead to serious consequences.
Cyber News, Cyber Threat TrendsAnalysis of six major cloud incidents shows how some common mistakes can lead to serious consequences.
Cyber News, Cyber Threat TrendsThe US Treasury states that it is in contact with financial regulators as it monitors the breach.
Cyber News, Cyber Threat TrendsThe Clop ransomware group is actively exploiting a SysAid zero-day flaw after running rampant through enterprise systems using MOVEit file transfer bug.
Cyber News, Cyber Threat TrendsCheckmarx researchers warn that BlazeStealer can exfiltrate information, steal passwords, disable PCs, and take over webcams.
Cyber News, Cyber Threat TrendsKaspersky said the primary focus of these actors is cyber-espionage and information gathering
Cyber News, Cyber Threat TrendsThe threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in SysAid IT support software in limited attacks, according to new findings from Microsoft. Lace Tempest, which is known for distributing the Cl0p ransomware, has in the past leveraged zero-day flaws in MOVEit Transfer and PaperCut servers. The […]
Cyber NewsA new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. “This incident is a part of a larger malvertising campaign that targets other utilities like Notepad++, Citrix, and VNC Viewer as seen in its […]
Cyber NewsPeriodic outages began on November 8
Cyber News, Cyber Threat TrendsExtended internet of things (XIoT) security platform developer NetRise has released its Trace solution, which the company say allows users to identify and validate compromised and vulnerable third-party and proprietary software assets using an AI-powered semantic search. NetRise, based in Austin, Texas, said Trace introduces intent-driven searches to enhance vulnerability detection and validation in firmware […]
Cyber News, Cyber Threat Trends