Security News

Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
2024-04-24 13:36

Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix, also...

PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)
2024-04-24 11:52

More details of and a proof-of-concept exploit for an unauthenticated OS command injection vulnerability in Flowmon, Progress Software's network monitoring/analysis and security solution, have been published. The critical vulnerability has been disclosed and patched by Progress earlier this month.

Dan Solove on Privacy Regulation
2024-04-24 11:05

Consent plays a profound role in nearly all privacy laws. There are generally two approaches to consent in privacy law.

Global attacker median dwell time continues to fall
2024-04-24 11:00

While the use of zero-day exploits is on the rise, Mandiant's M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median dwell time - the time attackers remain undetected within a target environment - has reached its lowest point in over a decade. In 2023, organizations detected intrusions within a median of 10 days, a notable decrease from 16 days in 2022.

GISEC Global 2024 video walkthrough
2024-04-24 10:00

In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features the following vendors:...

Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users
2024-04-24 09:36

Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users' keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered...

CISO Perspectives on Complying with Cybersecurity Regulations
2024-04-24 09:24

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the...

Photos: GISEC Global 2024
2024-04-24 09:18

GISEC Global is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. Here are a few photos from the event, featured vendors include: Waterfall Security Solutions,...

If Britain is so bothered by China, why do these .gov.uk sites use Chinese ad brokers?
2024-04-24 07:29

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
2024-04-24 07:02

A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat...