This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges
As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly...
Cisco strengthens AWS integration to speed troubleshooting in multicloud environments
Cisco this week said it has bolstered integrations between its own hybrid cloud offerings and Amazon Web Services...
Latrodectus malware and how to defend against it with Wazuh
Latrodectus is a versatile malware family that infiltrate systems, steal sensitive data, and evades detection. Learn more from...
Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access
Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel...
Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers
Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on...
Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor
A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported...
Bitcoin hits $100,000 as investors bet on Trump crypto rally
It burst through the threshold after the president-elect announced a crypto-friendly Wall Street regulator. Source:: BBC News –...
3 NIST Researchers Receive Presidential Rank Awards
All three were awarded the “Distinguished Rank,” the highest category of Presidential Rank Awards. Source:: NIST
Want to Grow Vulnerability Management into Exposure Management? Start Here!
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of...
Mitel MiCollab zero-day flaw gets proof-of-concept exploit
Researchers have uncovered an arbitrary file read zero-day in the Mitel MiCollab collaboration platform, allowing attackers to access...
Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers
A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long...
Our secret ingredient for reverse engineering
Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for reverse engineering. While IDA...
Vodafone-Three £16.5bn merger gets the go-ahead
The deal, which creates the UK’s biggest mobile network, has had to overcome competition concerns. Source:: BBC News...
ANEL and NOOPDOOR Backdoors Weaponized in New MirrorFace Campaign Against Japan
The China-linked threat actor known as MirrorFace has been attributed to a new spear-phishing campaign mainly targeting individuals...
NCA Busts Russian Crypto Networks Laundering Funds and Evading Sanctions
The U.K. National Crime Agency (NCA) on Wednesday announced that it led an international investigation to disrupt Russian...
CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added multiple security flaws affecting products from Zyxel, North Grid...
Will AWS’ next-gen Trainium2 chips accelerate AI development and put Amazon ahead in the chips race?
AWS appears to have upped the stakes in the AI infrastructure market this week with the rollout of...
Microsoft says having a TPM is “non-negotiable” for Windows 11
Microsoft made it abundantly clear this week that Windows 10 users won’t be able to upgrade to Windows...
Cisco NX-OS Software Image Verification Bypass Vulnerability
A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to...
White House: Salt Typhoon hacked telcos in dozens of countries
Chinese state hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, President Biden’s deputy...