enterprise security
FritzFrog Botnet Strikes Back Exploiting Log4Shell Vulnerability
A new variant of the sophisticated botnet “FritzFrog” has emerged, leveraging the Log4Shell vulnerability for propagation. Despite more than two years passing since the Log4j flaw was discovered, attackers continue to exploit ...
Mitigate Ivanti Vulnerabilities: CISA Issues Emergency Directive
In recent times, the cybersecurity landscape has witnessed a surge in threats targeting Ivanti Connect Secure and Ivanti Policy Secure solutions. The Cybersecurity and Infrastructure Security Agency (CISA) has raised a red ...
CISA Mandates Urgent Patching for Citrix NetScaler Vulnerabilities
In a recent move to bolster cybersecurity defenses, CISA has issued a directive to U.S. federal agencies to urgently secure their systems against three newly patched vulnerabilities in Citrix NetScaler and Google ...
HealthEC Data Breach Impacts 4.5 Million Patients
In the evolving landscape of healthcare cybersecurity, the recent data breach at HealthEC LLC has sent shockwaves through the industry, affecting nearly 4.5 million individuals who received care through the company’s diverse ...
Google Cloud Patched Privilege Escalation Vulnerability
Recently, Google Cloud addressed a medium-severity security vulnerability that could potentially be exploited by attackers with access to a Kubernetes cluster. This flaw, discovered and reported by Palo Alto Networks Unit 42, ...
Attackers Targeting Poorly Managed Linux SSH Servers
In recent times, Linux SSH servers have become a prime target for attackers aiming to compromise security and exploit vulnerabilities for malicious activities. This article delves into the growing concern surrounding poorly ...
Understanding the Terrapin Attack: A New Threat to OpenSSH
Researchers at Ruhr University Bochum have discovered a new threat to OpenSSH security known as the Terrapin attack. This sophisticated attack manipulates sequence numbers during the handshake process, compromising the integrity of ...
Above 30% Apps at Risk with Vulnerable Log4j Versions
An alarming 38% of applications that use the Apache Log4j library use the versions susceptible to security vulnerabilities. One of them is a critical vulnerability, Log4Shell (CVE-2021-44228), for which patches have been ...
SLAM Attack: New Vulnerability Targets Intel, AMD, Arm CPUs
In a groundbreaking revelation, researchers from Vrije Universiteit Amsterdam have uncovered a formidable side-channel attack known as SLAM, posing a serious threat to the security of current and future CPUs manufactured by ...
Top five things to do in Las Vegas
We’re kicking off the 2024 cybersecurity event calendar in Las Vegas at CES 2024! For those joining us from the 9th – 12th, and in need of any other ways to shake ...