Nations require licensing of cybersecurity professionals

Malaysia has joined at least two other nations – Singapore and Ghana – in passing laws requiring cybersecurity professionals or their companies to be certified and licensed to provide certain…

The most trusted name in InfoSec belongs to Ivanti Bugs

Hackers from foreign states used vulnerable Ivanti edge devices to gain three months of “deep” access to one of MITER Corp.’s unclassified networks. MITER, steward of the ubiquitous ATT&CK glossary…

ToddyCat APT is stealing data on an ‘industrial scale’

An APT (Advanced Persistent Threat) group. known as ToddyCat is collecting industrial-scale data from government and defense targets in the Asia-Pacific region. Kaspersky researchers tracking the campaign described this week…

The Nespresso domain serves a steaming cup of phishing, without cream or sugar

A phishing campaign exploiting a bug in Nespresso’s website has managed to evade detection by taking advantage of security tools that fail to look for nested or hidden malicious links.…

Russian hacker group ToddyCat uses advanced tools for industrial-scale data theft

April 22, 2024PressroomNetwork Security/Endpoint Security The menacing actor known as ToddyCat a wide range of tools have been observed to be used to maintain access to compromised environments and steal…

Where hackers find your weak points

COMMENT Social engineering is one of them most popular attack vectors used by cyber fraudsters to infiltrate organizations. These manipulative attacks are typically carried out in four phases: Information gathering…

MITER Corporation hacked by state hackers exploiting Ivanti flaws

April 22, 2024News about hackersNetwork security/cyber security The MITER Corporation revealed that it was the target of a nationwide cyberattack that exploited two zero-day flaws in Ivanti Connect Secure appliances…

Pentera’s 2024 report reveals hundreds of security events per week, highlighting the criticality of continuous validation

In the last two years, a shocking fact 51% of organizations surveyed in a major industry report have been compromised by a cyber attack. Yes, more than half. And this,…

Researchers discover Windows flaws that give hackers rootkit-like powers

April 22, 2024PressroomRootkits/Software Security New research has found that the process of path conversion from DOS to NT could be exploited by threat actors to gain rootkit-like capabilities to hide…

North Korean hackers turn to AI-powered cyber espionage

April 22, 2024PressroomCryptocurrency/Artificial Intelligence Microsoft has revealed that state-sponsored cyber actors linked to North Korea have begun using artificial intelligence (AI) to make their operations more effective and efficient. “They…