Mallox Ransomware Flaw Lets Victims Recover Files Without Ransom Payment. Previously known as TargetCompany, ransomware has undergone several evolutionary changes since its initial appearance. While the malicious actors addressed an
Uncategorized
MITRE CVE Program Marks 25th Anniversary, Accumulating 240,000 Records by 2024
The Common Vulnerabilities and Exposures (CVE®) Program celebrates its 25th anniversary, marking a remarkable journey from its inception in 1999 to becoming a cornerstone of global cybersecurity vulnerability management. Starting
Akira Ransomware Actors Developing Rust Variant To Attack ESXi Servers
Akira Ransomware Actors are Developing a Rust Variant to Attack ESXi servers. First identified in March 2023, it targets both Windows and Linux systems. It is first identified in March
Crypto Payment Firm Transak Hit by Data Breach After Employee’s Laptop Hack
Transak, a leading crypto payment services provider, has been affected by a significant data breach that affected over 92,000 users. The incident, which came to light on October 21, 2024,
Cisco Disables DevHub Access After Security Breach
Sophos Acquires Secureworks in $859 Million Deal
In a significant move that is set to reshape the cybersecurity landscape, Sophos has announced its acquisition of SecureWorks for $859 million. The all-cash deal, revealed on October 21, 2024,
GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections
The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat actors. They also target PNG files primarily because they can
Internet Archive Breached Again, Hackers Exploited Unrotated API Tokens
The Internet Archive has fallen victim to another cyberattack, marking the third major security incident in October 2024. On October 20, hackers successfully exploited unrotated API tokens to gain unauthorized
DHS report warns violent extremists pose threat to election workers and voting process
Domestic violent extremists will pose “the most significant physical threat to government officials, voters, and elections-related personnel and infrastructure, including polling places, ballot drop box locations, voter registration sites, campaign
The Growing Threat of Cyber-Physical Convergence
What is cyber-physical convergence and why is it a growing threat? Over the past few years, threats within the cyber and physical domains have become increasingly intertwined and indistinct. ‘Cyber-physical convergence’