Security News

CL0P's Ransomware Rampage - Security Measures for 2024
2024-04-09 11:24

2023 CL0P Growth  Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the ‘CryptoMix’ ransomware, brought about by its owner CL0P ransomware, a...

New Latrodectus loader steps in for Qbot
2024-04-09 10:47

Newloader malware called Latrodectus is being leveraged by initial access brokers and it looks like it might have been written by the same developers who created the IcedID loader. TA577 used Latrodectus in at least three campaigns in November 2023 before reverting to Pikabot," Proofpoint and Team Cymru researchers noted.

6 Best Open Source Password Managers for Windows in 2024
2024-04-09 10:29

While closed-source password managers don't publicly share their codes for users to modify, open-source password managers do share their codes with a community of users to revise or update over time. Top open-source password managers for Windows comparison table.

TechRepublic Academy Is Offering Extra 20% Off Most Deals Through April 16
2024-04-09 08:42

Site-wide sales are not an everyday thing, so it would be a shame to miss this opportunity to grab your favorite deals at TechRepublic Academy with an extra 20% discount on the already lowered prices. From April 8th through 11:59 PM Pacific Time on April 16th, TechRepublic Academy is having site-wide sales by offering a 20% additional discount on most deals.

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
2024-04-09 07:24

Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware such as Venom RAT, Remcos RAT, XWorm,...

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
2024-04-09 05:46

Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage (NAS) devices. Tracked...

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
2024-04-09 05:30

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

How exposure management elevates cyber resilience
2024-04-09 04:43

Understanding an attacker's viewpoint is crucial for pinpointing vulnerabilities, informing security teams where to apply security measures first and what additional security controls are necessary. Without seeing how an attacker can infiltrate the organization, securing an organization becomes a hypothetical task.

EJBCA: Open-source public key infrastructure (PKI), certificate authority (CA)
2024-04-09 04:30

It can handle almost anything, and someone once called it the kitchen sink of PKI. With its extensive history as one of the longest-standing CA software projects, EJBCA offers proven robustness, reliability, and adaptability. "EJBCA was created as an open-source project. The first version of the software was released as open source in December 2001. The ability to make a living from working with it and form a good company with many developers working on open source came later when the co-founders of PrimeKey and I realized that it was something we could do," Tomas Gustavsson, the creator of EJBCA, told Help Net Security.

Strategies for secure identity management in hybrid environments
2024-04-09 04:00

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Wylie also highlights strategies for combating password fatigue, integrating IAM solutions, securing operational technology, and establishing identity security policies.