ESET Threat Report H1 2024These past six months painted a dynamic landscape of Android Financial threats – malware going after victims’ mobile banking funds – be it in the form …
Category:
Cyber Security
- Cyber SecurityTechnology
Cloudflare: We never authorized polyfill.io to use our name
by Wire Techby Wire TechCloudflare, a lead provider of content delivery network (CDN) services, cloud security, and DDoS protection has warned that it has not authorized the use of its name or logo on …
- Cyber Security
New MOVEit Transfer Vulnerability Under Active Exploitation – Patch ASAP!
by Wire Techby Wire TechNew MOVEit Transfer Vulnerability Under Active Exploitation – Patch ASAP! A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the wild shortly …
- Cyber Security
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
by Wire Techby Wire TechChinese and N. Korean Hackers Target Global Infrastructure with Ransomware Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting …
- Cyber SecurityTechnology
LockBit lied: Stolen data is from a bank, not US Federal Reserve
by Wire Techby Wire TechRecently-disrupted LockBit ransomware group, in what appears to be a desperate attempt to make a comeback, claimed this week that it had hit US Federal Reserve, the central bank of …
- Cyber Security
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
by Wire Techby Wire TechNew Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit card web …
- Cyber SecurityTechnology
CISA: Most critical open source projects not using memory safe code
by Wire Techby Wire TechThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published research looking into 172 key open-source projects and whether they are susceptible to memory flaws. The report, cosigned by CISA, …
- Cyber Security
Cyber insurance as part of the cyber threat mitigation strategy
by Wire Techby Wire TechCyber insurance as part of the cyber threat mitigation strategyOffsetting business risk with insurance is not new. Early mariners transporting their goods around the world hundreds of years ago faced …
- Cyber Security
New Attack Technique Exploits Microsoft Management Console Files
by Wire Techby Wire TechNew Attack Technique Exploits Microsoft Management Console Files Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain …