General Security News
-
Behind The Buzzword: Four Ways to Assess Your Zero Trust Security Posture
With just about everything delivered from the cloud these days, employees can now collaborate and access what they need from anywhere and on any...
-
DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online
Recently to create unique digital fingerprints and use them for web surveillance purposes, the cyber security analysts from Ben Gurion...
-
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
As many as 23 new high severity security vulnerabilities have been disclosed in different implementations of Unified Extensible Firmware Interface...
-
Hacker Group 'Moses Staff' Using New StrifeWater RAT in Ransomware Attacks
A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously...
-
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations
A WordPress plugin with over one million installs has been found to contain a critical vulnerability that could result in the execution of...
-
North Korean Hacker Group Deliver KONNI Rat Malware Using Weaponized Office Document
The North Korean threat actors under the Kimsuky Umbrella are using a piece of malware which is called KONNI. KONNI is a RAT (Remote...
-
North Korean Hackers Leverages Windows Update Client to Execute Malicious Payload
In an on-going latest campaign, the Windows Update client has been recently added to the living-off-the-land binaries (LoLBins) list of Lazarus,...
-
Reasons Why Every Business is a Target of DDoS Attacks
DDoS (Distributed Denial of Service) attacks are making headlines almost every day. 2021 saw a 434% upsurge in DDoS attacks, 5.5 times higher than...
-
Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users
Details have emerged about a previously undocumented malware campaign undertaken by the Iranian MuddyWater advanced persistent threat (APT) group...
-
New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks
A number of security vulnerabilities have been disclosed in 42 Gears' SureMDM device management solution that could be weaponized by attackers to...
-
LockBit Linux-ESXi Locker Ransomware Variant Targets VMware ESXi Servers
The new ransomware group, LockBit, is targeting the VMware ESXi servers or virtual machines with their new Linux encryptor that is dubbed as...
-
Researchers Use Natural Silk Fibers to Generate Secure Keys for Strong Authentication
A group of academics at South Korea's Gwangju Institute of Science and Technology (GIST) have utilized natural silk fibers from domesticated...