Two of the most popular open-source ventures have identified several weaknesses, Google and Apache. The vulnerabilities may be used to access various proprietary information stealthily and provide access to lateral movement in a firm. Moreover, the glitch may be used...
Cyberspace has enjoyed relative peace over the past few years due to a significant decline in ransomware attacks. This tranquility may be attributed to the combined efforts of several international intelligence agencies and various tech companies to eradicate...
Hackers use a zero-day vulnerability in Zimbra to inject a malicious payload onto vulnerable webmail servers using the PGP decryption exploit they ported during a recent Black Hat 2022 conference. To take control of the victim’s email account, the hacker would...
A Zeus variant that first surfaced in August 2016 called Zeppelin has resurfaced and is now being used to compromise Web servers to distribute its payload. The threat researchers at Forcepoint Security Labs said they first started seeing new Zeppelin malware samples...
Organizers of DEF CON, the world’s largest hacker conference, have announced a date for its 20th anniversary in Las Vegas. The event took place from August 7 to August 10, just after Black Hat USA in a move organizers say will allow both events to grow and be...
Blog SOC 2 Readiness Assessment: All You Need to Know SOC 2 Readiness Assessment: All You Need to Know You’ve heard about SOC 2 audits, and you’re scrambling to ensure your organization is ready for this significant compliance task. Many must realize that the real...
Blog All you need to know about SOC 2 audits All you need to know about SOC 2 audits A SOC 2 Audit is a set of guidelines and standards that’s been around for many years. It was originally intended as a voluntary standard to promote customer privacy protection but...
Researchers have discovered a devious malware for Linux: backdooring devices and stealing data. The malware can alter the overall functioning of any device that it gets into. Popularly known as Orbit, the malware works differently from regular Linux threats. The...
North Korea’s state-sponsored ransomware operators have launched a campaign targeting healthcare organizations in the United States. This is according to an advisory issued by the Federal Bureau of Investigations (FBI) and the Infrastructure Security Agency...
The Cisco Talos Threat Analytic and Research Unit has picked up several threats and vulnerabilities in the popularly used industrial cellular gateway IoT. The affected device, called the R1510, was created by a Chinese company called Robustel. The product is designed...
Blog CISA Suggests That Organizations Use the Most Recent Version of Google Chrome CISA Suggests That Organizations Use the Most Recent Version of Google Chrome Users and administrators should update to a new version of Chrome released by Google last week to address...
Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud...