News & Updates

Dr. Active Directory vs. Mr. Exposed Attack Surface: Who’ll Win This Fight?

Active Directory (AD) is among the oldest pieces of software still used in the production environment and can be found in most organizations today. This is despite the fact that its historical security gaps have never been amended. For example, because of its inability to apply any security measures beyond checking for a password and username match, AD (as well the resources it manages) is
Cybersecurity Tools

Lemon Gang Pre-Infects 9 Million Android Devices With Malware

Nearly 9 million Android-based smartphones, watches, TVs, and TV boxes have been infected with the “Guerrilla” malware, pre-installed on the devices by Lemon Group. The threat actors use the malware to load additional payloads, intercept one-time passwords from SMS, set up reverse proxy from the infected device, hijack WhatsApp sessions, and more. Cybersecurity researchers identified […]

The post Lemon Gang Pre-Infects 9 Million Android Devices With Malware appeared first on Heimdal Security Blog.

News & Updates

Developer Alert: NPM Packages for Node.js Hiding Dangerous TurkoRat Malware

Two malicious packages discovered in the npm package repository have been found to conceal an open source information stealer malware called TurkoRat.
The packages – named nodejs-encrypt-agent and nodejs-cookie-proxy-agent – were collectively downloaded approximately 1,200 times and were available for more than two months before they were identified and taken down.
ReversingLabs, which broke
News & Updates

Accessibility should be a cybersecurity priority, says UK NCSC

The UK National Cyber Security Centre (NCSC) has urged businesses and security leaders to make accessibility a cybersecurity priority to help make systems more secure and human errors/workarounds less likely. It can also aid in meeting legal requirements, delivering better operational outcomes, and attracting and retaining more diverse talent, according to the NCSC.

However, there are various examples of cybersecurity being presented in a way that is inaccessible for a lot of people, particularly for those with disabilities, the NCSC wrote in a new post on its website. This has negative effects on both businesses and employees, including making systems less secure, hindering security awareness, and limiting access to diverse skills.

To read this article in full, please click here

News & Updates

Apple Addresses Three New Critical Flaws in WebKit. Update Now!

Threat actors are apparently actively exploiting three new flaws in iOS and
macOS, according to the latest security advisory from Cupertino, California. As
usual, Apple is offering timely patches that users should prioritize.

The latest round of updates from Apple addresses a plurality of vulnerabilities,
some nastier than others, across the company’s entire consumer lineup. Three
particular flaws, however, stand out.

Tracked as CVE-2023-32409, a new WebKit flaw affects most iPhones and iPads

News & Updates

Wisconsin Teen Charged with Major Sports Betting Platform Hack

A young man from Wisconsin has found himself facing serious legal consequences
after hacking numerous online betting accounts.

Joseph Garrison, 18, has been charged by the Department of Justice (DoJ) with
gaining unlawful access to approximately 60,000 accounts on DraftKings, a
popular sports betting platform.

According to the complaint
[https://www.justice.gov/d9/2023-05/u.s._v._garrison_complaint.pdf], the illicit
operation occurred in November 2022, with Garrison allegedly using a database

Cybersecurity Tools

Application Control 101: Definition, Features, Benefits, and Best Practices

Application control is part and parcel of the larger cybersecurity landscape of access control, as outlined by the National Institute of Standards and Technology (NIST). But what does the term mean? And, more importantly, why should companies be interested in the concept? In this article, I will discuss the definition of application control, as well […]

The post Application Control 101: Definition, Features, Benefits, and Best Practices appeared first on Heimdal Security Blog.

Cybersecurity Tools

Technical Analysis For Binary Options Trading: A Comprehensive Guide

Are you looking to get a grasp on the incredibly complex yet highly lucrative world of binary options trading? Every day, more traders are taking advantage of the potential rewards this type of investment can offer. But without proper knowledge, binary options trading platforms and brokers, and technical analysis techniques in place, investing in binary […]

The post Technical Analysis For Binary Options Trading: A Comprehensive Guide appeared first on SecureBlitz Cybersecurity.

Exit mobile version