Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Security Insights: Investigating Ivanti Connect Secure Auth Bypass and RCE

On January 10th, 2024, Volexity reported that there is active exploitation in the wild against Ivanti Connect Secure (ICS) VPN devices. Ivanti and Volexity worked together to review impacted devices, and Volexity identified two different zero days, which have been assigned the following CVEs IDs.

How To Avoid Scams on Facebook Marketplace

You can avoid scams on Facebook Marketplace by only using secure methods of payment, looking at buyer and seller reviews, inspecting an item closely before purchasing it and only communicating through Messenger. While Facebook Marketplace is a great way to find clothes, furniture and other items at discounted prices, there comes the risk of being scammed on the platform, making it crucial to be extra cautious as both a buyer and a seller.

Beyond Compliance: Secure Your Business in the Cloud with Falcon Cloud Security

Cloud infrastructure is subject to a wide variety of international, federal, state and local security regulations. Organizations must comply with these regulations or face the consequences. Due to the dynamic nature of cloud environments, maintaining consistent compliance for regulatory standards such as CIS, NIST, PCI DSS and SOC 2 benchmarks can be difficult, especially for highly regulated industries running hybrid or multi-cloud infrastructures.

Social Engineering Attacks Rising in the Trucking Industry

Spear phishing and voice phishing (vishing) are on the rise in the trucking industry, according to a new report from the National Motor Freight Traffic Association (NMFTA). “Spear phishing is still one of the most effective tools attackers have to breach networks,” the report says.

New Evasive Phishing Technique "Legacy URL Reputation Evasion" (LURE)

Researchers at Menlo Security observed a 198% increase in browser-based phishing attacks over the past six months. “Attackers have developed tools to craft high quality large scale attacks that target the browser,” the researchers write. “Cybercrime tools, such as phish kits (PhaaS) and ransomware-as-a-service kits (RaaS), have simplified the process of launching sophisticated attacks.

HP Enterprise Reveals It was hacked by the same Russians that broke into Microsoft

In a new SEC disclosure, Hewlett Packard Enterprise (HPE) announced on Wednesday that it fell prey to the same Russian intelligence group, known as Midnight Blizzard or Cozy Bear, that recently breached Microsoft's email system. This disclosure comes just a week after Microsoft reported a similar intrusion, putting the spotlight back on this notorious hacking group.

The Number of Ransomware Attack Victims Surge in 2023 to over 4000

The surge in Ransomware-as-a-Service affiliates is likely the reason behind the dramatic increase in the number of victimized organizations, with all indicators suggesting that this trend will persist into 2024. I love it when vendors put out a yearly summary, and do it in the first month of the next year! The data is relevant and helps paint a picture of what the industry should expect in the near future. In Cyberint’s 2023 Ransomware Recap report, we find that ransomware had quite the year.

Data Privacy Dilemma: How to Address Growing Concerns in an Extremely Online World

Users are becoming increasingly aware of where and how their information is shared, and their concerns regarding the need to keep that data private are growing in turn. Digitalization, rising daily averages for time spent on the Internet and connected devices, along with the ongoing proliferation of cyberattacks, have made individuals more cautious than ever when it comes to providing information online – and rightfully so.

How to Strengthen Cybersecurity in the Healthcare Industry

Technology is a crucial part of today’s healthcare and pharmaceutical industries. Advances in medical devices, data use, and interconnected systems have significantly improved patient care, reduced costs, and increased efficiency. However, as the sector’s reliance on technology grows, so does the risk of cyberattacks.

Trustwave SpiderLabs Detects Spike in Greatness Phishing Kit Attacks on Microsoft 365 Users

Trustwave SpiderLabs is tracking a spike in usage of the Greatness phishing kit to attack Microsoft 365 users to distribute malicious HTML attachments that steal login credentials. Greatness is a phishing-as-a-service platform developed by a threat actor known as "fisherstell," and has been available since mid-2022 that provides a ready-made infrastructure and tools for anyone to launch phishing campaigns charging $120 per month in Bitcoin.