Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

CVE-2024-6387 - RCE Vulnerability in OpenSSH

A high-severity remote code execution (RCE) vulnerability, CVE-2024-6387, has been discovered in OpenSSH’s server by the Qualys research team. This vulnerability is particularly concerning as it revives an issue that was previously addressed in 2006, highlighting the persistence of hidden bugs in widely used secure software. This discovery follows another significant vulnerability in the XZ Utils library found just a few months ago, underscoring ongoing security challenges.

A Complete Overview of Binary-Based SAST

Zimperium's Global Mobile Threat Report found that unique mobile malware samples grew by 51% in 2022. According to Anne Neuberger, the US Deputy National Security Advisor for Cyber and Emerging Technologies, the annual average cost of cybercrime will reach over $23 trillion in 2027. The threat landscape and the cost of ignoring security are increasing. It is no longer advisable to just be reactive but proactive in maintaining the security of mobile devices.

Google Authenticator vs Keeper

An authenticator app is a method of Multi-Factor Authentication (MFA) that adds an extra layer of security to your online accounts. Keeper can be used in place of Google Authenticator as it stores, generates and automatically fills your authentication code along with your login credentials. Continue reading to learn about the downsides of Google Authenticator and why Keeper Password Manager is the better choice.

Exploiting EUROs excitement: Phishing attacks surge using major brands as bait

Following the kick-off of the UEFA EUROs 2024 in Germany, Egress’ Threat Intelligence team has observed a massive spike in Euros-related phishing attacks, recording 7,000 unique campaigns with over 24,000 individual attacks since June 17th, 2024. These attacks are more sophisticated than you might expect, with many attackers choosing to impersonate businesses associated with the tournament rather than impersonating UEFA directly.

Deep Dive into Blockchain Security: Vulnerabilities and Protective Measures

Blockchain technology, renowned for its decentralized and immutable nature, promises enhanced security for various applications. However, like any technology, it is not without vulnerabilities. This in-depth examination explores the security aspects of blockchain, identifies common vulnerabilities, and outlines the measures needed to secure blockchain applications effectively.

Can My iPhone Get a Virus?

Yes, your iPhone can get viruses. However, it is uncommon for iPhones to get viruses due to the nature of Apple’s iPhone Operating System (iOS). Because iPhone users are only able to download apps from the App Store, this makes it much harder for hackers to infect their devices. Having a jailbroken iPhone would make you more susceptible to getting infected with viruses because you could download unauthorized apps outside of the App Store.

Children's Hospital Cyberattack Compromises Sensitive Medical Data

A recent cyberattack on Lurie Children's Hospital in Chicago has resulted in a significant data breach, exposing the personal information of 791,000 patients. Despite the hospital's refusal to pay a ransom, a vast amount of sensitive medical data is now at risk. Details of the Attack The cybercriminals infiltrated the hospital's systems, causing severe disruptions to its patient portal, communications, and access to medical records.

Massive Supply-Chain Ransomware Attack Cripples Thousands of Car Dealerships

A widespread ransomware attack has brought thousands of car dealerships across the United States to a halt. The incident, attributed to the BlackSuit ransomware gang, targeted CDK Global, a software provider essential to the operations of numerous car dealerships. This breach underscores the critical need for robust cybersecurity measures such as stolen credentials detection, darknet monitoring services, and digital footprint analysis.

7 Phishing Awareness Training Methods You Should Know

Modern cybercriminals aren’t just after your average employee. They’re targeting DevOps engineers – the gatekeepers of critical infrastructure and valuable data. 90% of data breaches start with phishing. Traditional awareness training often needs more technical depth. These programs tend to focus on generic red flags (e.g., suspicious links and requests for sensitive information) that are easily recognized by most.