Security News

New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers
2024-06-19 10:23

Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs)...

Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software
2024-06-19 10:08

A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital currency users on social media with information stealer malware and...

How can SLTTs defend against cyber threats?
2024-06-19 07:51

Managing cybersecurity for any organization is no easy feat. Improving cybersecurity maturity is often even more difficult, made increasingly challenging by the eye-watering costs of cybersecurity products and solutions.

Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
2024-06-19 07:36

Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious actors to achieve arbitrary code execution on susceptible...

That PowerShell 'fix' for your root cert 'problem' is a malware loader in disguise
2024-06-19 07:27

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.

SELKS: Open-source Suricata IDS/IPS, network security monitoring, threat hunting
2024-06-19 04:30

SELKS is a free, open-source, turnkey solution for Suricata-based network intrusion detection and protection, network security monitoring, and threat hunting. Since all the data in SELKS is generated by the Suricata engine, it is popular among network security practitioners who explore the capabilities of Suricata IDS/IPS/NSM and analyze the network protocol monitoring logs and alerts it generates.

Cybersecurity jobs available right now: June 19, 2024
2024-06-19 04:00

As a Cyber Security Engineer, you will define and monitor security requirements for applications and infrastructures. As an Incident Response Analyst, you will investigate and respond to cybersecurity incidents, conduct threat hunting activities using various tools and techniques, prepare detailed incident reports and briefings for clients and internal stakeholders, collaborate with cross-functional teams to enhance security measures and protocols, and train junior staff and contribute to knowledge sharing within the team.

Find out which cybersecurity threats organizations fear the most
2024-06-19 03:30

While 62% of organizations have begun their own zero trust journey, only 48% of US organizations have, raising a concern that Western entities know they have a problem but are unable to adopt zero trust, leaving them vulnerable to cyber threats. Cloud security incidents make organizations turn to AI-powered prevention.

Rising exploitation in enterprise software: Key trends for CISOs
2024-06-19 03:00

Action1 researchers found an alarming increase in the total number of vulnerabilities across all enterprise software categories. "With the NVD's delay in associating Common Vulnerabilities and Exposures identifiers with CPE data, our report comes at a critical moment, providing much-needed insights into the evolving vulnerability landscape for enterprise software," said Mike Walters, President of Action1.

Rogue uni IT director pleads guilty after fraudulently buying $2.1M of tech
2024-06-18 23:46

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.