Cybersecurity

The Sophos Active Adversary Report – Sophos News

It’s not news that 2024 has been a tumultuous year on many fronts. For our second Active Adversary Report of 2024, we’re looking specifically...

Careto APT’s recent attacks discovered

During the first week of October, Kaspersky took part in the 34th Virus Bulletin International Conference, one of the longest-running cybersecurity events. There, our...

Vulnerability Symbiosis: vSphere?s CVE-2024-38812 and CVE-2024-38813 [Guest Diary]

Background In April 2020, at the height of the global pandemic, virtualization was in high demand.  During that time, vSphere 7.0 was released. With that...

Hacker in Snowflake Extortions May Be a U.S. Soldier – Krebs on Security

Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but...

AI chatbot startup WotNot leaks 346,000 files, including passports and medical records

An Indian AI startup that helps businesses build custom chatbots has leaked almost 350,000 sensitive files after the data was left unsecured on the...

mobman 2 – Darknet Diaries

Full Transcript In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware....

ESET APT Activity Report Q2 2024–Q3 2024

ESET Research, Threat Reports An overview of the activities of selected APT groups...

Welcoming the Armenian Government to Have I Been Pwned

Today, we're happy to welcome the 37th government to have full and free access to domain searches of their gov domains in Have I...

November Patch Tuesday loads up everyone’s plate – Sophos News

Microsoft on Tuesday released 89 patches affecting 14 product families. Two of the addressed issues, both touching Windows, are considered by Microsoft to be...

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

Dec 07, 2024The Hacker NewsEnterprise Security / Threat Prevention Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead...

VEEAM exploit seen used again with a new ransomware: “Frag” – Sophos News

Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities...

Meet hrtng, Kaspersky GReAT’s plugin for IDA Pro

Nowadays, a lot of cybersecurity professionals use IDA Pro as their primary tool for reverse engineering. While IDA is a complex tool that implements...

Recent articles