Storm-1811, a financially driven threat actor that employs social engineering techniques, has recently been observed exploiting RMM tools to distribute the Black Basta ransomware. The threat actor exploits the client
All posts by admin
Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform
With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure Sweet Security today announced the release of its unified Cloud Native Detection and Response platform,
‘Bootkitty’ First Bootloader to Take Aim at Linux
Interpol Cyber-Fraud Action Nets More Than 5K Arrests
AWS Launches New Incident Response Service
Hackers Exploited Windows Event Logging Tool To Steal Data Secretly
Wevtutil.exe, a Windows event log utility, can be used maliciously in Living Off the Land (LOLBAS) to export logs for exfiltration, query specific event data, or clear logs. Attackers increasingly
HID collaborates with N.I.D.O. Srl Group to provide new contactless National ID Card
HID has provided a new contactless ID card to San Marino, to modernise its national identity document to meet the demands of the digital era. This national ID was built
Hackers Used Weaponized Resume To Infect User & Moved To Server Environments – Incident Report
A sophisticated cyber attack was detected in March 2024, revealing a complex intrusion that began with a weaponized resume and culminated in the compromise of multiple servers. This incident highlights
Political instability biggest risk for businesses, report finds
Political instability has overtaken extreme weather as the biggest risk concern for businesses, according to a new survey from global security and healthcare risk management business, Healix. Shifting alliances and growing
The Security Institute announces recipients of Baroness Ruth Henig Scholarship Programme
The Security Institute (UK) has confirmed that 14 outstanding recipients have received The Baroness Ruth Henig Scholarship, dedicated to recognising talent and potential within the security profession. Scholarship winners This