ProcessUnity introduces the industry’s all-in-one third-party risk management platform

PRESS RELEASE BOSTON–(COMMERCIAL WIRE)– ProcessUnityprovider of comprehensive end-to-end third-party risk management and cybersecurity solutions for leading enterprises, today announced the full integration of the Global Risk Exchange (formerly CyberGRX). Newly…

HeadCrab 2.0 goes fileless, targeting Redis servers for cryptocurrency mining

01 February 2024PressroomCryptocurrency/Botnet Cyber ​​security researchers have detailed an updated version of the malware HeadCrab which is known to target Redis database servers worldwide since early September 2021. The development,…

The new NCCoE guide helps major industries observe incoming data using the latest Internet security protocol

PRESS RELEASE Companies in major industries such as finance and healthcare must follow best practices to monitor incoming data for cyber attacks. The latest Internet security protocol, known as TLS…

Why the right metrics matter when it comes to vulnerability management

How is your vulnerability management program going? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you know how well you are doing,…

“Commando Cat” is the second campaign of the year targeting Docker

In the findings released by Cado researchers, a malware campaign, called “Commando Cat”, was discovered that targets exposed subjects Docker API Endpoints. THE cryptojacking campaign it has only been active…

Docker API exposed under attack in “Commando Cat” cryptojacking campaign.

01 February 2024PressroomCryptojacking/Linux Security Docker API endpoints exposed on the Internet are under attack by a sophisticated cryptojacking campaign called Commando Cat. “The campaign uses a harmless container generated using…

Saudi Arabia launches “Generative AI for All” program.

Saudi Arabia has launched a generative artificial intelligence (GenAI) program. support research and inform policies for technology implementation. Saudi Minister of Communications and Information Technology Abdullah Al-Swaha announced that the…

FritzFrog returns with Log4Shell and PwnKit, spreading malware within your network

01 February 2024PressroomCyber ​​attack/Botnet The threat actor behind a peer-to-peer (P2P) botnet known as Fritz Rana is back with a new variant that exploits the Log4Shell vulnerability to propagate internally…

Ransomware groups gain clout with claims of fake attacks

The cybersecurity community is being misled by false breach reports from ransomware groups, experts say, and ransomware misinformation is a threat they say will only increase in the coming months.…

US Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers

The US government said on Wednesday it has taken steps to neutralize a botnet comprising hundreds of US-based small office and home office (SOHO) routers hijacked by a China-linked state-sponsored…