Researchers discover LG Smart TV vulnerabilities that allow root access

09 April 2024PressroomIoT Vulnerabilities/Security Numerous security vulnerabilities have been found in LG webOS running on its smart TVs that could be exploited to bypass authorization and gain root access on…

DDoS protection requires investigative and preventative controls

In the security profession, controls are one of the main tools we use to reduce risk. In doing so, we leverage a mix of preventative and investigative controls. As the…

Hackers targeting human rights activists in Morocco and Western Sahara

09 April 2024PressroomCyber ​​espionage/Malware Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor using phishing attacks to trick victims into installing…

Frameworks, guidelines and bounties alone will not defeat ransomware

COMMENT The US government is stepping up efforts to stem this increasingly disruptive situation scourge of ransomware attacks. For example, the State Department recently offered up to $15 million for…

10-year-old Romanian hacker group “RUBYCARP” emerges with a botnet

09 April 2024PressroomBotnet/cryptocurrency mining He called a threatening group of suspected Romanian origin RUBY CARP A long-running botnet has been observed maintaining cryptocurrency mining, distributed denial of service (DDoS) attacks,…

The CL0P ransomware rampage: Security measures for 2024

CL0P growth 2023 Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor, the “CryptoMix” ransomware, created by its owner CL0P ransomware, a cyber…

Revolutionizing privileged access management with One Identity Cloud PAM Essentials

09 April 2024News about hackersPrivileged access management As cyber threats loom around every corner and privileged accounts become prime targets, the importance of implementing a robust Privileged Access Management (PAM)…

Attackers using obfuscation tools to spread multi-stage malware via invoice phishing

09 April 2024PressroomMalware/Cryptojacking Cybersecurity researchers have uncovered an intricate multi-stage attack that leverages invoice-themed phishing lures to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm,…

Fleets of software-defined vehicles face a bumpy road when it comes to cybersecurity

When Israel-based REE Automotive designed the chassis of its P7 electric vehicle, it worked from software: The vehicle’s flat chassis is fully configurable with four independent modules near each tire…

Critical flaws leave 92,000 D-Link NAS devices vulnerable to malware attacks

09 April 2024PressroomBotnet/Vulnerabilities Threat actors are actively scanning and exploiting a pair of security flaws said to affect up to 92,000 D-Link network-attached storage (NAS) devices exposed to the internet.…