Saturday, May 4, 2024

Yearly Archives: 2022

Cybersecurity is foundational for economic recovery

Organizations, enterprises, and sectors must increasingly combine proactive and reactive digital resilience strategies — cyber security defences alone are no longer sufficient. Resilience must...

New Hertzbleed Attack Impacts Almost All Modern Intel and AMD Processors

A novel side-channel exploit that allows remote attackers to obtain entire cryptographic keys has been discovered. They do so by detecting changes in CPU...

Crypoto Wallet Apps Cloned to Steal Crypto

SeaFlower is a large-scale effort that uses cloned applications from cryptocurrency wallets including MetaMask, Coinbase, imToken, and TokenPocket, according to researchers.   The Seaflower Mission Was...

Panchan: A New Golang-based Peer-To-Peer Botnet Targeting Linux Servers

  Since its inception in March 2022, a new Golang-based peer-to-peer (P2P) botnet has been actively targeting Linux computers in the education sector.   The virus, dubbed...

AvosLocker and Cerber2021 Ransomware Exploit Confluence Bug

AvosLocker and Cerber2021 Ransomware Exploit Confluence Bug Ransomware organizations are exploiting an RCE vulnerability in Atlassian Confluence Server and Data Center instances that has already...

CrescentImp Malware Targets Ukraine’s Media Organisations

  Things are still difficult for Ukraine's war-torn country, and the situation is severe. As their struggle against Russia approaches its 100th day, a new...

Shoprite Group issues warning on ‘suspected data compromise’

  The Shoprite Group said on Friday evening that it had discovered a possible data breach involving names and ID numbers that might impact certain...

Three PyPI Packages Found Including Password Stealer by Mistake

  Due to the inclusion of a malicious'request' dependency in some versions, the PyPI packages 'keep,' 'pyanxdns,' and 'api-res-py' were revealed to include a backdoor...

How To Rename The Table In The Snowflake Method?

Excerpt: We've all heard of cloud computing, and there are a variety of methods available in cloud computing technology. The method known as a...

Symbiote: A New Malware Targeting Linux Systems

  Symbiote is a newly discovered sophisticated virus that infects all active processes on Linux computers. Since last year, the malware has been in active...

Most Read

Write For Us