Cybersecurity News | Quick Read
UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins
Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.
Cybersecurity News | Quick Read
BIG-IP RCE Bug Could Allow Device Takeover
Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.
Cybersecurity News | Quick Read
Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks
In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.
Cybersecurity News | Quick Read
Transport for NSW Suffers Cyber Incident
Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.
Security alerts | Quick Read
Botnet StealthWorker – M.O, Infectious Mechanism(s), and Distribution.
Cybersecurity News | Quick Read
Hacking Group Moshen Dragon Targets Asian Telecommunication Companies
The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.
Cybersecurity News | Quick Read
Threat Actors Sent Malicious Emails Using Google SMTP Relay Service
In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.
Cybersecurity News | Quick Read
REvil Ransomware Makes a Comeback
The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.
Cybersecurity News | Quick Read
Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards
User Security and Privacy Not a Priority for these Types of Apps.
Cybersecurity News | Quick Read
Conti’s BazarLoader Replaced with Bumblebee Malware
Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.
Cybersecurity News | Quick Read
EmoCheck Tool 2.2 Supports and Detects New 64-bit Variants of Emotet Malware
How to Verify if You Are Infected with Emotet Trojan.
Cybersecurity News | Quick Read
Medical Software Company Fined €1.5M for Exposing 490k Patients' Data
Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).
Cybersecurity News | Quick Read
The Tenet Case: Are Hackers Targeting the Healthcare Industry?
How Healthcare Can Stay Safe in this Cybersecurity Landscape.
Forensics and threat hunting | Quick Read
Threat-Hunting Journal April 2022 – Easter Edition
Top Malware(s) Detections: 1st of April – 28th of April
Cybersecurity News | Quick Read
Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms
15 Common Flaws of Last Year Now Put Together in a List.
Cybersecurity News | Quick Read
The Nimbuspwn Linux Flaw Allows Root Access
Local Attackers Could Use Nimbuspwn to Escalate Privileges on Linux Systems.
Cybersecurity News | Quick Read
Coca-Cola Investigates Hacker Data Theft Allegations
The Stormous Gang Claimed to Have Hacked into the Company’s Servers.
Cybersecurity News | Quick Read
Cyber Reporting: New Legislation Impacts US Banks
What Are the New Rules?
Cybersecurity interviews | Quick Read
How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview
CEO Morten Kjærsgaard Shared His View on the Cybersecurity Industry through the Russia vs. Ukraine Conflict.
Cybersecurity News | Quick Read
The US Agriculture Sector Targeted with Ransomware Attacks, the FBI Says
Threat Actors Might Take Advantage of the Harvest Season.
Cybersecurity News | Quick Read
Microsoft Exchange Servers Targeted by Hive Ransomware
The Attack Explained.
Access Management | Quick Read
Authentication vs. Authorization: the Difference Explained
Authentication and Authorization Concepts. Authentication & Authorization Methods.
Cybersecurity News | Quick Read
REvil's TOR Sites Are Back With New Ransomware
The Servers Have Returned to Service After Months of Inactivity.
Cybersecurity News | Quick Read
Emotet Botnet Grows in Size and Activity
The Malware May Soon Switch to New Payloads That Are Caught by Fewer Antivirus Engines.
Cybersecurity News | Quick Read
Millions of Laptops Impacted by Lenovo UEFI Firmware Vulnerabilities
If Abused, Hackers Could Deploy and Run Firmware Implants.
Cybersecurity News | Quick Read
A Zero-Click Vulnerability Is Exploited by NSO Spyware
The New Zero-Click iMessage Vulnerability May be Used to Install the Malware on iPhones.
Cybersecurity News | Quick Read
Lazarus Hackers Make Use of Fraudulent Crypto Apps, US Warns
The Threat Actors Use Social Engineering Techniques to Lure Victims to Download Malicious Apps.
Cybersecurity News | Quick Read
IcedID Malware Is Being Used in a New Hacking Campaign Targeting the Ukrainian Government
Threat Actors Are Exploiting a Zimbra Vulnerability in the Second Stage of the Cyberattacks.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats