Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Exploited: Ivanti Virtual Traffic Manager (vTM ) (CVE-2024-7593)

This post is based on ongoing security research – the post will continue to be updated as we get additional information… A critical vulnerability has just been announced in Ivanti’s Virtual Traffic Manager (vTM) that allows unauthenticated remote attackers to create administrator users.

Streamline Life Sciences R&D with Egnyte's Document Room

Discover the power of Egnyte’s Document Room for Life Sciences. Our Virtual Data Room (VDR) provides a secure and compliant environment for managing controlled documents, meeting regulatory standards, and enhancing collaboration across your R&D teams. Watch this video to learn how Egnyte’s Document Room boosts transparency, safeguards sensitive data, and accelerates fundraising efforts. Streamline clinical and non-clinical workflows while maintaining the highest security standards.

Are "iPhone Hacked" Pop-Ups Real?

As you’re browsing the internet on your phone, you encounter a pop-up message saying, “Your iPhone has been hacked!” The message claims your device has been infected with malware. Is this message even real? No, pop-ups claiming that your iPhone has been hacked are not real. These kinds of pop-ups are scams that cybercriminals create intending to scare you into clicking them. After you click on these pop-ups, malware can start downloading on your device.

PSPF 001-2024: Safeguarding GovTech from Foreign Influence

In 2024, the Australian government introduced PSPF Direction 001-2024 in recognition of the potential threats posed by Foreign Ownership, Control, or Influence (FOCI) on technology assets and GovTech (government technology operations). As part of the Protective Security Policy Framework (PSPF), PSPF 001-2024 is a crucial step in evaluating and mitigating cyber risks associated with foreign interference in the procurement and maintenance of technology assets.

InCyber Forum Europe recap: 4 tips from DevSecOps experts

As your organization considers how to shift security left and facilitate shared responsibility for fixing issues, it can be tricky to know where to start. Which tooling will work best with your existing processes? What are the best ways to spread the word about the importance of application security? And once you’ve chosen tools, how do you actually get developers to use them?

Vulnerabilities in NodeJS C/C++ add-on extensions

One of the main goals of this research was to explore C/C++ vulnerabilities in the context of NodeJS npm packages. The focus will be on exploring and identifying classic vulnerabilities like Buffer Overflow, Denial of Service (process crash, unchecked types), and Memory Leakages in the context of NodeJS C/C++ addons and modeling relevant sources, sinks, and sanitizers using Snyk Code (see Snyk brings developer-first AppSec approach to C/C++).

Ransomware Kingpin Who Called Himself "J P Morgan" Extradited to the United States

An investigation dating back almost ten years has seen the extradition this week to the United States of a man suspected to be the head of one the world's most prolific Russian-speaking cybercriminal gangs. The UK's National Crime Agency (NCA) says it has been investigating a cybercriminal using the online handle "J P Morgan" since 2015, alongside parallel investigations run by the United States FBI and Secret Service.

Updates and Evolution of the NIST Cybersecurity Framework: What's New?

The NIST Cybersecurity Framework (CSF), published by the US National Institute of Standards and Technology (NIST), is a widely used set of guidelines for mitigating organizational cybersecurity risks. It contains recommendations and standards to help organizations identify and detect cyberattacks and advice on how to respond, prevent, and recover from cybersecurity incidents.

We Made It! Nucleus Placed 267 on Inc. 5000 Fastest Growing Companies

This week, Nucleus can add another accolade to a growing list, being listed as number 267 on Inc. Magazine’s list of the 5000 fastest-growing companies in America. We are proud of the growth we’ve achieved as a company and the potential for the future at Nucleus. Looking more closely at the results, we are the fourth fastest-growing security company on the list. As many people know, the cybersecurity and technology market has been tumultuous recently.