Russian hackers hijack Pakistani hackers’ servers for their own attacks
The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156’s infrastructure to launch...
Russian hackers hijack Pakistani hackers’ servers for their own attacks
The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156’s infrastructure to launch...
Report: AI expands the IT workforce as tech jobs return to offices
Artificial intelligence is driving growth for the IT workforce, and jobs in the technology sector are stabilizing as...
AWS upgrades its 10p10u network to handle massive AI clusters
While virtualized compute is the foundation of cloud computing, enabling all that compute to transmit data is the...
Japan warns of IO-Data zero-day router flaws exploited in attacks
Japan’s CERT is warning that hackers are exploiting zero-day vulnerabilities in I-O Data router devices to modify device...
Six password takeaways from the updated NIST cybersecurity framework
Updated NIST guidelines reject outdated password security practices in favor of more effective protections. Learn from Specops Software...
U.S. Offered $10M for Hacker Just Arrested by Russia
In January 2022, KrebsOnSecurity identified a Russian man named Mikhail Matveev as “Wazawaka,” a cybercriminal who was deeply...
Europol Dismantles Criminal Messaging Service MATRIX in Major Global Takedown
Europol on Tuesday announced the takedown of an invite-only encrypted messaging service called MATRIX that’s created by criminals...
7 PAM Best Practices to Secure Hybrid and Multi-Cloud Environments
Are you using the cloud or thinking about transitioning? Undoubtedly, multi-cloud and hybrid environments offer numerous benefits for...
How to Plan a New (and Improved!) Password Policy for Real-World Security Challenges
Many organizations struggle with password policies that look strong on paper but fail in practice because they’re too...
Kaspersky Security Bulletin 2024. Statistics
All statistics in this report come from Kaspersky Security Network (KSN), a global cloud service that receives information...
Researchers Uncover Backdoor in Solana’s Popular Web3.js npm Library
Cybersecurity researchers are alerting to a software supply chain attack targeting the popular @solana/web3.js npm library that involved...
Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks
A joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber...
Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console
Veeam has released security updates to address a critical flaw impacting Service Provider Console (VSPC) that could pave...
Critical SailPoint IdentityIQ Vulnerability Exposes Files to Unauthorized Access
A critical security vulnerability has been disclosed in SailPoint’s IdentityIQ identity and access management (IAM) software that allows...
Telegram U-turns and joins child safety scheme
It is the latest in a series of changes announced by the platform since its founder Pavel Durov...
Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses
Cybersecurity researchers have called attention to a novel phishing campaign that leverages corrupted Microsoft Office documents and ZIP...
Microsoft hit with more litigation accusing it of predatory pricing
A UK law firm on Tuesday filed what amounts to a class-action lawsuit against Microsoft, accusing it of...
Vodka maker Stoli files for bankruptcy in US after ransomware attack
Stoli Group’s U.S. companies have filed for bankruptcy following an August ransomware attack and Russian authorities seizing the...
Cloudflare’s developer domains increasingly abused by threat actors
Cloudflare’s ‘pages.dev’ and ‘workers.dev’ domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by...