Security News

Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor
2023-07-11 19:09

Learn how a malicious driver exploits a loophole in the Windows operating system to run at kernel level. Cisco Talos discovered a new Microsoft Windows policy loophole that allows a threat actor to sign malicious kernel-mode drivers executed by the operating system.

The Need for Risk-Based Vulnerability Management to Combat Threats
2023-07-07 14:04

As vulnerabilities continue to rise and security evolves, it is becoming increasingly apparent that conventional vulnerability management programs are inadequate for managing the expanding attack surface. As a result, many security teams are scrambling to adopt modern vulnerability management programs that are capable of identifying and thwarting contemporary vulnerability-based threats.

Close Security Gaps with Continuous Threat Exposure Management
2023-07-07 10:37

Leading analyst firm Gartner Research describes the solution: "By 2026, organizations prioritizing their security investments based on a continuous exposure management program will be 3x less likely to suffer from a breach." IT and security teams constantly face threat exposures, and they must proactively address critical security gaps in their exposed assets.

Is your browser betraying you? Emerging threats in 2023
2023-07-07 04:00

Browser-based emerging threats New browser-based social engineering trends. Three of the four new threats that debuted on our top ten malware list this quarter have strong ties to nation states, although this doesn't necessarily mean those malicious actors are in fact state-sponsored.

RedEnergy Stealer-as-a-Ransomware Threat Targeting Energy and Telecom Sectors
2023-07-05 14:10

The malware "Possesses the ability to steal information from various browsers, enabling the exfiltration of sensitive data, while also incorporating different modules for carrying out ransomware activities," Zscaler researchers Shatak Jain and Gurkirat Singh said in a recent analysis. Following a successful breach, the malicious binary is used as a conduit to set up persistence, perform the actual browser update, and also drop a stealer capable of covertly harvesting sensitive information and encrypting the stolen files, leaving the victims at risk of potential data loss, exposure, or even the sale of their valuable data.

Small organizations face security threats on a limited budget
2023-07-05 03:00

Small organizations face the same security threats as organizations overall but have less resources to address them, according to Netwrix. Smaller organizations usually have fewer resources and experience with which to address security threats.

Undiplomatic Chinese threat actor attacks embassies and foreign affairs departments
2023-07-04 05:29

Infosec outfit Checkpoint says it's spotted a Chinese actor targeting diplomatic facilities around Europe. Checkpoint has dubbed the campaign "SmugX" thanks to its use of HTML smuggling to deploy the PlugX remote access trojan.

Kaspersky’s New Report Reveals the Top Cyber Threats for SMBs in 2023
2023-06-29 19:40

A new report from Kaspersky reveals the top cyber threats for SMBs in 2023. The biggest cybersecurity threat to SMBs is the use of exploits by attackers; there were 483,980 detections in the five first months of 2023.

Popular generative AI projects pose serious security threat
2023-06-29 04:30

Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, resulting in an environment with substantial risk for organizations, according to Rezilion. "On top of their inherent security issues, individuals and organizations provide these AI models with excessive access and authorization without proper security guardrails. Through our research, we aimed to convey that the open-source projects that utilize insecure generative AI and LLMs have poor security posture as well. These factors result in an environment with significant risk for organizations."

Inside Threat Actors: Dark Web Forums vs. Illicit Telegram Communities
2023-06-26 14:05

In this post, we're going to explore common threat actors and their activities on dark web forums versus illicit Telegram communities. Hackers on dark web forums are more commonly known to share more zero-day exploits to other threat actors as well as share with other hackers how to use these exploits to their advantage as well.