PRESS RELEASE Houston, Texas, April 4, 2024 (GLOBE NEWSWIRE) — Action1 Corporationa provider of integrated real-time vulnerability detection capabilities and patch management automation solution, today unveiled its “School Defense” program…
Category: Cyber Security
A new phishing campaign targets the oil and gas sector with advanced malware capable of stealing data
04 April 2024PressroomPhishing/Malware attack An updated version of information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas industry. “The phishing emails use a lure…
Thousands of Australian businesses targeted by RAT
More than 11,000 Australian businesses have been targeted in a recent wave of cyberattacks that rely on an outdated but still dangerous strain of malware dubbed Agent Tesla. Potential victims…
Vietnam-based hackers steal financial data across Asia with malware
A suspected threat actor of Vietnamese origin has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to collect valuable data since at least May…
Serious security flaw exposes 1 million WordPress sites to SQL Injection
Attackers can exploit a critical SQL injection vulnerability in a widely used system WordPress plugins to compromise more than 1 million sites and extract sensitive data such as password hashes…
New HTTP/2 vulnerability exposes web servers to DoS attacks
04 April 2024PressroomInternet Protocol/Vulnerabilities New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct Denial of Service (DoS) attacks. The technique has a…
Shutters operations against cyber attacks at Japanese lens manufacturer
Japanese lens maker Hoya is investigating a cyber incident that disrupted several manufacturing sites and an ordering system this week. Hoya, one of the world’s largest lens manufacturers, produces eyeglass…
Operational Technology Cybersecurity Considerations
Operational Technology (OT) refers to the hardware and software used to modify, monitor, or control the company’s physical devices, processes, and events. Unlike traditional information technology (IT) systems, OT systems…
The dual role of AI in SMB brand spoofing
AI is simultaneously making it easier for adversaries to carry out brand spoofing and easier for organizations to block spoofing and other threats. Both uses have significant implications for small…
How the 2022 Football World Cup in Qatar was almost hacked
Approximately six months before the 2022 FIFA World Cup soccer tournament in Qatar, a threat actor, later identified as China-linked BlackTech, silently breached the network of a major gaming communications…