09 April 2024PressroomIoT Vulnerabilities/Security Numerous security vulnerabilities have been found in LG webOS running on its smart TVs that could be exploited to bypass authorization and gain root access on…
Category: Cyber Security
DDoS protection requires investigative and preventative controls
In the security profession, controls are one of the main tools we use to reduce risk. In doing so, we leverage a mix of preventative and investigative controls. As the…
Hackers targeting human rights activists in Morocco and Western Sahara
09 April 2024PressroomCyber espionage/Malware Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor using phishing attacks to trick victims into installing…
Frameworks, guidelines and bounties alone will not defeat ransomware
COMMENT The US government is stepping up efforts to stem this increasingly disruptive situation scourge of ransomware attacks. For example, the State Department recently offered up to $15 million for…
10-year-old Romanian hacker group “RUBYCARP” emerges with a botnet
09 April 2024PressroomBotnet/cryptocurrency mining He called a threatening group of suspected Romanian origin RUBY CARP A long-running botnet has been observed maintaining cryptocurrency mining, distributed denial of service (DDoS) attacks,…
The CL0P ransomware rampage: Security measures for 2024
CL0P growth 2023 Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor, the “CryptoMix” ransomware, created by its owner CL0P ransomware, a cyber…
Revolutionizing privileged access management with One Identity Cloud PAM Essentials
09 April 2024News about hackersPrivileged access management As cyber threats loom around every corner and privileged accounts become prime targets, the importance of implementing a robust Privileged Access Management (PAM)…
Attackers using obfuscation tools to spread multi-stage malware via invoice phishing
09 April 2024PressroomMalware/Cryptojacking Cybersecurity researchers have uncovered an intricate multi-stage attack that leverages invoice-themed phishing lures to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm,…
Fleets of software-defined vehicles face a bumpy road when it comes to cybersecurity
When Israel-based REE Automotive designed the chassis of its P7 electric vehicle, it worked from software: The vehicle’s flat chassis is fully configurable with four independent modules near each tire…
Critical flaws leave 92,000 D-Link NAS devices vulnerable to malware attacks
09 April 2024PressroomBotnet/Vulnerabilities Threat actors are actively scanning and exploiting a pair of security flaws said to affect up to 92,000 D-Link network-attached storage (NAS) devices exposed to the internet.…