The most important security metric

COMMENT Risk reduction has long been the guiding principle of security teams. However, even though security teams today are larger and have more sophisticated security stacks, risk remains at an…

A risk-based strategy for the highest ROI

February 29, 2024News about hackersAttack Surface/Incident Response As an IT leader, staying abreast of the latest cybersecurity developments is essential to maintaining the security of your organization. But with threats…

GTPDOOR Linux malware targets telecommunications, exploiting GPRS roaming networks

February 29, 2024PressroomLinux/Network Security Threat hunters have discovered a new Linux malware called GTPDOOR designed to be deployed in telecommunications networks adjacent to GPRS roaming exchanges (GRX) The malware is…

Lazarus exploits typos to introduce PyPI malware into development systems

February 29, 2024PressroomMalware/endpoint security The infamous North Korean hacking group Lazarus has uploaded four packages to the Python Package Index (PyPI) repository with the aim of infecting developers’ systems with…

New backdoor targeting European officials linked to Indian diplomatic events

February 29, 2024PressroomCyber ​​espionage/Malware Dubbed a previously undocumented threat actor STARTING WINE has been observed targeting officials in European countries with Indian diplomatic missions using a new backdoor called WINE…

Chinese hackers exploit flaws in Ivanti VPN to distribute new malware

At least two different suspected cyber espionage clusters linked to China, identified as UNC5325 AND UNC3886were attributed to the exploitation of security flaws in Ivanti Connect Secure VPN equipment. UNC5325…

NIST releases Cybersecurity Framework 2.0

After several years of deliberation, the National Institute for Standards and Technology (NIST) has released its Cybersecurity Framework 2.0. THE new framework builds on its long-standing recommendations on cyber risk…

“Voltzite” destroys African utilities as part of Volt Typhoon assault

“Voltzite,” the operational technology (OT)-focused unit within China’s Volt Typhoon Advanced Persistent Threat (APT), is targeting electrical transmission and distribution organizations in African nations, likely with a similar motivation to…

US government expands role in software security

The Biden administration continues to push for closer public-private partnerships to strengthen the U.S. information technology infrastructure, calling on companies to move to memory-safe programming languages ​​and calling on the…

Discover “XHelper”, the all-in-one Android app for global money laundering

Cybercriminals are laundering stolen funds through ordinary people, thanks to a small ecosystem of intuitive apps that can turn any mobile user into an unwitting money mule. A new report…