Why Major American Companies Held a Joint Cyber Drill, and You Should Too

Employees from large US enterprises, including Mastercard, Lumen Technologies, AT&T, and others recently joined with ...
The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks

The Evolving Triad of Cyber Threats: BEC, Ransomware, and Supply Chain Attacks

Historically, cybercriminals have been happy to stick with proven tactics for as long as possible. After all, it's a business to them—if it ain't broke, why fix it? However, this is not ...
malware Raspberry Robin evasion

Raspberry Robin Malware Now Using Windows Script Files to Spread

The threat actors behind Raspberry Robin are using highly sophisticated evasion techniques to stay under the radar of antivirus software ...
Security Boulevard
A person standing in a field, but with a TV for a head

Watch This? Patch This! LG Fixes Smart TV Vulns

4×CVE=RCE or Merely CE? Update your LG TV now, or let hackers root it. But is Bitdefender overhyping the issue? ...
Security Boulevard
Ominous looking guy looking at a phone

Insider Threats Surge Amid Growing Foreign Interference

A surge in insider threats, amidst increasing foreign interference and sophisticated tactics, suggests the need for enhanced detection and mitigation strategies ...
Security Boulevard

Patch Tuesday Update – April 2024

The post Patch Tuesday Update - April 2024 appeared first on Digital Defense ...

Patch Tuesday Update – April 2024

For April 2024, Microsoft has rolled out a significant update aimed at bolstering the security and performance of its product suite. In this month’s release, users and IT administrators are encouraged to ...

What is Session Hijacking?

Session hijacking is a prevalent and dangerous attack method frequently employed by cybercriminals to illicitly gain access and then take control of user accounts and systems. Session hijacking is a type of ...
CVE-2024-3094: RCE Vulnerability Discovered in XZ Utils

CVE-2024-3094: RCE Vulnerability Discovered in XZ Utils

CVE-2024-3094 is a critical Remote Code Execution (RCE) vulnerability found in the popular open-source XZ Utils library. This vulnerability affects XZ Utils versions 5.6.0 and 5.6.1 and could enable unauthorized attackers to ...
worm on a black background

10 Million Devices Were Infected by Data-Stealing Malware in 2023

Cybercriminals pilfered an average of 50.9 login credentials per device, evidence of the pressing need for cybersecurity measures ...
Security Boulevard