Tag: Cyber defense

news-19072024-223126

Cybersecurity Alert: Malicious Hackers Exploit CrowdStrike Outage – CISA Warning | TechCrunch

As the world slowly recovers from a recent outage caused by CrowdStrike, a cybersecurity leader, malicious hackers are taking advantage of the chaos to...
news-19072024-183202

Beware of Fake CrowdStrike Outage Scams: How to Stay Safe

The security firm CrowdStrike made a mistake with a software update that caused chaos for Windows computers. As the fallout continues, there is a...
news-19072024-183113

Why Cyber Resilience is Essential: Lessons from CrowdStrike’s IT Outage

Cyber resilience is crucial for any business, as demonstrated by the recent IT outage caused by a misconfigured content update released by CrowdStrike. The...
news-16072024-021549

Uncovering the Hidden Backdoor in Fake AWS Files: A Closer Look

Recently, researchers discovered that two fake AWS packages on the NPM JavaScript repository contained hidden code that backdoored developers' computers when executed. These packages,...
news-11072024-023448

Exploitation of Windows 0-day by Threat Actors for Over a Year

Threat actors have been exploiting a zero-day vulnerability in Windows, targeting users with malware for over a year. This vulnerability affected both Windows 10...
news-10072024-022928

Blast-RADIUS MD5-Based Vulnerability in RADIUS Protocol: A Detailed Overview

The RADIUS protocol, commonly used for network authentication, is currently facing a significant vulnerability known as the Blast-RADIUS MD5-based vulnerability. This vulnerability poses a...
news-02072024-065003

Malware Campaign Targets Cisco Nexus Switches: What You Need to Know

Chinese hackers have been discovered exploiting a zero-day vulnerability in specific Cisco switches to control the devices and install malware. The discovery was made...
news-26062024-191059

Russian civilian charged for helping GRU spies target Ukrainian government systems with malware

The Department of Justice has accused a Russian civilian, Amin Stigal, of being involved in a conspiracy to attack Ukrainian government computer systems with...
news-25062024-000710

Securing Your Network: Why You Should Never Assume the End of an Attack Infrastructure

In February 2024, Operation Cronos, a coalition of international law enforcement agencies led by the UK’s National Crime Agency and the U.S. FBI, seized...

BREAKING NEWS

Top News