Category: hacking attacks

The Importance of Secrets Management for Cybersecurity: New Study Shows Alarming Security Gaps

The Importance of Secrets Management for Cybersecurity: New Study Shows Alarming Security Gaps

professionals believe that their organization is not adequately secured against secrets exposure. The study also revealed that a shocking 64% of developers are storing API and other important secrets in plain text, leading to dangerous security gaps that can be easily exploited. Additionally, the study found that despite the widespread adoption of DevOps practices, many

Read More
FireEye Report Reveals Sophisticated Adversary-in-the-Middle (AitM) Cyberattacks Targeting Dozens of Organizations in Broad Business Email Compromise (BEC) Campaign

FireEye Report Reveals Sophisticated Adversary-in-the-Middle (AitM) Cyberattacks Targeting Dozens of Organizations in Broad Business Email Compromise (BEC) Campaign

multi-factor authentication and other security measures, and then proceeded to monitor email communication between the victim and their business associates,” says a report from cybersecurity firm FireEye. The attacks were carried out using sophisticated techniques, such as sending seemingly legitimate emails from compromised accounts within the targeted organizations, and creating fake domain names that resembled

Read More
US DOJ Charges Two Russians from Fancy Bear for Mt. Gox Heist Worth $16 Billion

US DOJ Charges Two Russians from Fancy Bear for Mt. Gox Heist Worth $16 Billion

h3 The DoJ Charges Two Russians for Mt. Gox Heist • Alexey Bilyuchenko, 43, and Aleksandr Verner, 29, have been charged with conspiring to launder 647,000 stolen bitcoins from the now-defunct cryptocurrency exchange, Mt. Gox. • The hackers were part of a notorious Russian hacking group called Fancy Bear. • The stolen bitcoins had an

Read More
“Protecting Your Customer Data: Cloudflare’s Layered Approach to API Security”

“Protecting Your Customer Data: Cloudflare’s Layered Approach to API Security”

API traffic has been growing at twice the rate of web traffic, making APIs susceptible to potential security breaches. In order to protect customer data, Cloudflare suggests implementing new security solutions designed specifically for APIs. These security solutions can keep up with the rapid growth and ensure that APIs remain secure. The “Quantifying the Cost

Read More
“Fortinet discovers critical vulnerability CVE-2023-27997 exploited in limited attacks on government and critical infrastructure”

“Fortinet discovers critical vulnerability CVE-2023-27997 exploited in limited attacks on government and critical infrastructure”

lead to remote code execution. Fortinet Discloses Critical Flaw Exploited in Limited Attacks on Government and Critical Infrastructure Fortinet, a leading provider of cybersecurity solutions, has announced the discovery of a newly patched critical vulnerability that could potentially lead to remote code execution. The vulnerability, tracked as CVE-2023-27997 (CVSS score: 9.2), is a heap-based buffer

Read More
Security Researchers Discover Severe Vulnerability in Microsoft Visual Studio Installer

Security Researchers Discover Severe Vulnerability in Microsoft Visual Studio Installer

extensions could capture data entered into legitimate forms, record all user keystrokes, or execute arbitrary code on the affected machine.” ## Warning about Security Vulnerability in Microsoft Visual Studio Installer Security researchers have sounded an alarm over a severe security vulnerability in the Microsoft Visual Studio installer. The flaw leaves the entire installation process wide

Read More
“BatCloak Malware: Advanced Obfuscation Techniques Drive Targeted Attacks in Healthcare, Telecom, and Finance Sectors”

“BatCloak Malware: Advanced Obfuscation Techniques Drive Targeted Attacks in Healthcare, Telecom, and Finance Sectors”

are reported to be unique to BatCloak, indicating that the malware maker was well-equipped with expertise in obfuscation techniques. The malware maker actively monitors the detection rate of the samples and updates them on a regular basis to ensure that they remain undetectable. BatCloak’s obfuscation techniques are so advanced that the malware remains undetected even

Read More
“Understanding Attack Surface Management: Why It’s Crucial for Today’s Organizations”

“Understanding Attack Surface Management: Why It’s Crucial for Today’s Organizations”

is one that seems to be here to stay. This relatively new term refers to the process of identifying and managing the various points where an attacker could gain access to a network or system. Let’s delve deeper into why ASM has become so important. First, the rise of cloud computing and remote work has

Read More
Honda’s E-commerce Platform: Vulnerabilities, Risks & Response

Honda’s E-commerce Platform: Vulnerabilities, Risks & Response

Honda’s E-commerce Platform Vulnerability Honda’s e-commerce platform has been found to have security vulnerabilities that could have been exploited to gain unrestricted access to sensitive dealer information by security researchers. Eaton Zveare explained that “Broken/missing access controls made it possible to access all data on the platform, even when logged in as a test account.”

Read More
Beware of This Undetected Cryptocurrency Scam Linked to Russian-Speaking Group “Impulse”

Beware of This Undetected Cryptocurrency Scam Linked to Russian-Speaking Group “Impulse”

A Cryptocurrency Scam That Can’t Be Impulsive – Snowball Introduction Many years ago, a Nigerian prince promised us riches beyond our wildest dreams if we only sent him some of our money. Nowadays, we’re promised fame and fortune by investing in a cryptocurrency. But as the saying goes, if it sounds too good to be

Read More
0

Your Cart Is Empty

No products in the cart.