CYBERSECURITY

Why Stryker's Outage Is a Disaster Recovery Wake-Up Call

Why Stryker's Outage Is a Disaster Recovery Wake-Up Call

This week's cyberattack on medical technology company Stryker, which seems to have taken tens of thousands of systems offline, is a sobering reminder of.

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

It's Thursday again, and there are more strange security things that happened in just seven days This article explores thursday strange security. . Some.

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Researchers in cybersecurity have revealed information about a new piece of banking malware that targets Brazilian users and is written in Rust This.

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

Phishing has quietly become one of the hardest business threats to find early on This article explores cisos finding phishing. . Modern campaigns use.

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

Cybersecurity researchers have revealed information about a suspected AI-generated malware called Slopoly that a financially motivated hacker group called.

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple released fixes for a security hole in iOS, iPadOS, and macOS Sonoma on Wednesday. This hole was found to be part of the Coruna exploit kit. The.

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Researchers in cybersecurity have found six new types of Android malware that can steal data from infected devices and commit fraud with money This.

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

Based on proof of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a serious security hole that affects n8n to.

INC Ransomware Group Holds Healthcare Hostage in Oceania

INC Ransomware Group Holds Healthcare Hostage in Oceania

Cybersecurity experts in Oceania are warning that the INC ransomware operation is causing a lot of trouble for healthcare organizations in the area This.

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

Researchers Trick Perplexity's Comet AI Browser Into Phishing Scam in Under Four Minutes

It is possible to train and trick agentic web browsers that use artificial intelligence (AI) to do things on multiple websites on behalf of a user into.

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Cybersecurity researchers have made public information about two security holes in the n8n workflow automation platform that have since been fixed This.

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

A hacker group called UNC6426 used keys stolen from the nx npm package's supply chain last year to completely break into a victim's cloud environment in.

Middle East Conflict Highlights Cloud Resilience Gaps

Middle East Conflict Highlights Cloud Resilience Gaps

In the past two weeks, businesses that relied on the cloud's distributed nature to make sure their data was always available have had to face the truth.

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Discover how On Tuesday, Microsoft released patches for 84 new security holes that affect different parts of its software. Two of these holes are already.

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown

On Wednesday, Meta said it had disabled more than 150,000 accounts linked to scam centers in Southeast Asia This article explores scam centers southeast.

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Discover how Cybersecurity researchers have found five harmful Rust crates that pretend to be time-related tools in order to send .env file data to the.

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP has put out security updates to fix two serious security holes that could let hackers run any code they want on affected systems This article explores.

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Salesforce has warned that threat actors are becoming more active and are using a modified version of an open-source tool called AuraInspector to take.

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

Discover how You can't choose when the next big security hole will show up. You can decide how much of your environment is visible when it does. The.

Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit

Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit

After years of mysteriously avoiding custom malware, Russia's infamous Sednit threat group is back to using a custom toolkit in recent cyber espionage.

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary.

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

A new malware known as KadNap has been found by cybersecurity researchers This article explores malware known kadnap. . It mainly targets Asus routers in.

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Discover how Artificial Intelligence (AI) is now a tool that performs tasks for us rather than merely being a tool we communicate with. We refer to these.

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Based on evidence of active exploitation, the U.S This article explores vulnerability solarwinds web. . Cybersecurity and Infrastructure Security Agency.

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Two implants known as BEARDSHELL and COVENANT have been seen to be used by the Russian state-sponsored hacking group known as APT28 to enable long-term.

AI is Modifying File-Based Security Regulations

AI is Modifying File-Based Security Regulations

AI is altering file-based security regulations According to Gartner, global information security spending is expected to reach $240 billion in 2026.

Top 5 this week

Page 9 of 22