PRESS RELEASE BOSTON–(COMMERCIAL WIRE)– ProcessUnityprovider of comprehensive end-to-end third-party risk management and cybersecurity solutions for leading enterprises, today announced the full integration of the Global Risk Exchange (formerly CyberGRX). Newly…
Category: Cyber Security
HeadCrab 2.0 goes fileless, targeting Redis servers for cryptocurrency mining
01 February 2024PressroomCryptocurrency/Botnet Cyber security researchers have detailed an updated version of the malware HeadCrab which is known to target Redis database servers worldwide since early September 2021. The development,…
The new NCCoE guide helps major industries observe incoming data using the latest Internet security protocol
PRESS RELEASE Companies in major industries such as finance and healthcare must follow best practices to monitor incoming data for cyber attacks. The latest Internet security protocol, known as TLS…
Why the right metrics matter when it comes to vulnerability management
How is your vulnerability management program going? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you know how well you are doing,…
“Commando Cat” is the second campaign of the year targeting Docker
In the findings released by Cado researchers, a malware campaign, called “Commando Cat”, was discovered that targets exposed subjects Docker API Endpoints. THE cryptojacking campaign it has only been active…
Docker API exposed under attack in “Commando Cat” cryptojacking campaign.
01 February 2024PressroomCryptojacking/Linux Security Docker API endpoints exposed on the Internet are under attack by a sophisticated cryptojacking campaign called Commando Cat. “The campaign uses a harmless container generated using…
Saudi Arabia launches “Generative AI for All” program.
Saudi Arabia has launched a generative artificial intelligence (GenAI) program. support research and inform policies for technology implementation. Saudi Minister of Communications and Information Technology Abdullah Al-Swaha announced that the…
FritzFrog returns with Log4Shell and PwnKit, spreading malware within your network
01 February 2024PressroomCyber attack/Botnet The threat actor behind a peer-to-peer (P2P) botnet known as Fritz Rana is back with a new variant that exploits the Log4Shell vulnerability to propagate internally…
Ransomware groups gain clout with claims of fake attacks
The cybersecurity community is being misled by false breach reports from ransomware groups, experts say, and ransomware misinformation is a threat they say will only increase in the coming months.…
US Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers
The US government said on Wednesday it has taken steps to neutralize a botnet comprising hundreds of US-based small office and home office (SOHO) routers hijacked by a China-linked state-sponsored…