Ransomware Group Bypasses “Enormous” Range of EDR Tools
BlackByte delivers new way to circumvent endpoint detection
Cyber NewsBlackByte delivers new way to circumvent endpoint detection
Cyber NewsA former affiliate of the Netwalker ransomware has been sentenced to 20 years in prison in the U.S., a little over three months after the Canadian national pleaded guilty to his role in the crimes. Sebastien Vachon-Desjardins, 35, has also been ordered to forfeit $21,500,000 that was illicitly obtained from dozens of victims globally, including companies, municipalities, […]
Cyber NewsSector-specific hub will look to professionalize the sector
Cyber NewsMicrosoft has revised its mitigation measures for the newly disclosed and actively exploited zero-day flaws in Exchange Server after it was found that they could be trivially bypassed. The two vulnerabilities, tracked as CVE-2022-41040 and CVE-2022-41082, have been codenamed ProxyNotShell due to similarities to another set of flaws called ProxyShell, which the tech giant resolved last year.
Cyber NewsIt requires some federal agencies to perform automated asset discovery every seven days
Cyber NewsSuspect allegedly thought he was swapping secrets with a foreign government for crypto — but the contact turned out to be an FBI agent.
Cyber NewsThe Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database.
Cyber NewsIndia’s Central Bureau of Investigation (CBI) on Monday disclosed that it has detained a Russian national for allegedly hacking into a software platform used to conduct engineering entrance assessments in the country in 2021. “The said accused was detained by the Bureau of Immigration at Indira Gandhi International Airport, Delhi while arriving in India from […]
Cyber NewsTenable today announced the general availability of Tenable One, a unified exposure management platform designed to meet the changing needs of the modern cybersecurity professional by offering a holistic view of both on-premises and cloud-based attack surfaces. The modern cybersecurity attack surface is complex, fast-changing, and involves a panoply of different target systems and users […]
Cyber News