SonicWall Breached, Firewall Backup Data Exposed – Dark Reading
Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to “fewer than 5%” of its install base, according to the company. – Read More
Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to “fewer than 5%” of its install base, according to the company. – Read More
Digital forensics offers a challenging but rewarding career path for cybersecurity professionals willing to invest in specialized knowledge and continuous learning. – Read More
The cloud now acts as the connecting infrastructure for many companies’ assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats. – Read…
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime. – Read More
Though the groups have shared their decision to go dark, threat researchers say there are signs that it’s business as usual. – Read More
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel. – Read More
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware. – Read More
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets. – Read More
A data security platform based on action is what the industry needs right now to protect enterprise data. – Read More
“Chaotic Deputy” is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments. – Read More
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input. – Read More
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation. – Read More
Highly deceptive FileFix uses code obfuscation and steganography and has been translated into at least 16 languages to power a global campaign. – Read More
The cybercrime group, named after Japanese ghosts but believed to be from Morocco, uses a modified version of the Prince-Ransomware binary that includes a flaw allowing for partial data recovery.…
The company acquired HyperComply to help enterprises automate vendor security reviews and gain a real-time picture of the security of their entire supply chain. – Read More