News & Updates

Threat Actors Used Pegasus Spyware to Monitor Azerbaijan-Armenia War, Researchers Find

Researchers have uncovered hacking of civil society victims in Armenia with NSO
Group’s Pegasus spyware in what is being described as the first documented
evidence of the use of Pegasus in an international war context.

The joint investigation between Access Now, CyberHUB-AM, the Citizen Lab,
Amnesty International’s Security Lab, and an independent mobile security
researcher (Ruben Muradyan) kicked off after Apple sent a wave of notifications
to iPhone users in November 2021, warning that they m

News & Updates

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed.
Google-owned threat intelligence firm Mandiant dubbed the malware COSMICENERGY, adding it was uploaded to a public malware scanning utility in December 2021 by a submitter in Russia. There is no evidence that it has been put to use in the wild.
“The
Cybersecurity Tools

Heimdal®’s Threat Prevention Endpoint Wins ‘Cloud-Based Solution of the Year’ at the Network Computing Awards 2023

In an era where cyber threats continue to evolve and grow in complexity, Heimdal has once again risen to the occasion and emerged as a leading force in the industry. Therefore, it is with great honor and gratitude that we announce Heimdal’s Threat Prevention Endpoint has been awarded the prestigious ‘Cloud Based Solution of the […]

The post Heimdal®’s Threat Prevention Endpoint Wins ‘Cloud-Based Solution of the Year’ at the Network Computing Awards 2023 appeared first on Heimdal Security Blog.

News & Updates

Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances

Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been exploited to breach the company’s Email Security Gateway (ESG) appliances.
The zero-day is being tracked as CVE-2023-2868 and has been described as a remote code injection vulnerability affecting versions 5.1.3.001 through 9.2.0.006.
The California-headquartered firm 
News & Updates

D-Link fixes two critical flaws in D-View 8 network management suite

D-Link fixed two critical flaws in its D-View 8 network management suite that could lead to authentication bypass and arbitrary code execution. D-Link has addressed two critical vulnerabilities (CVSS score: 9.8) in its D-View 8 network management suite that could be exploited by remote attackers to bypass authentication and execute arbitrary code. The D-View network […]

The post D-Link fixes two critical flaws in D-View 8 network management suite appeared first on Security Affairs.

Cybersecurity Tools

‘Volt Typhoon’ infiltrates US critical infrastructure organizations

EXECUTIVE SUMMARY: The state-sponsored cyber criminal group known as ‘Volt Typhoon’ has launched a new series of cyber attacks that have affected communications, manufacturing, utility, transportation, information technology and education sectors within the U.S.  Microsoft identified stealthy and targeted malicious behavior focused on post-compromise credential access and network system discovery. The attacks were launched for […]

The post ‘Volt Typhoon’ infiltrates US critical infrastructure organizations appeared first on CyberTalk.

Exit mobile version