Cybersecurity Tools

Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration

SEQRITE Labs APT-Team has uncovered a phishing campaign targeting various Indian government personnel since October 2023. We have also identified targeting of both government and private entities in the defence sector over December. New Rust-based payloads and encrypted PowerShell commands have been utilized to exfiltrate confidential documents to a web-based service engine, instead of a dedicated command-and-control (C2) server. With actively […]

The post Operation RusticWeb targets Indian Govt: From Rust-based malware to Web-service exfiltration appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

Analysing Data Breaches Caused by Human Error

A deep dive into the ICO’s numbers We often hear the terms ‘accidental breach’ and ‘internal threat’, but how common are these phenomena? To find out, we looked at the ICO’s (Information Commissioner’s Office) public data set, specifically looking into four data breach types caused by human error: Note that this data set only accounts for personal data breaches reported to the ICO, so it only reflects breaches affecting UK residents that were not just discovered, but also reported. Also note that this blog only accounts for the data from 2020–2022, because these are the only years the ICO has

The post Analysing Data Breaches Caused by Human Error appeared first on IT Governance UK Blog.

Cybersecurity Tools

FBI Disrupts BlackCat Ransomware Threat Group Activity – The Essential Facts

The U.S. Justice Department (DoJ) announced on December 19th that the Federal Bureau of Investigations had disrupted the BlackCat ransomware threat group’s activity. The FBI offered a decryption tool to more than 500 affected victims. They also encourage potentially unknown BlackCat/ ALPHV victims to speak up. While the event is largely discussed across the cybersecurity […]

The post FBI Disrupts BlackCat Ransomware Threat Group Activity – The Essential Facts appeared first on Heimdal Security Blog.

Cybersecurity Tools

Sam McNicholls-Novoa on CyberComply

Making compliance easy with our Cloud-based solution CyberComply is a Cloud-based, end-to-end solution that simplifies compliance with a range of cyber security and data privacy standards and laws, including ISO 27001, the GDPR (General Data Protection Regulation), and more. This SaaS (Software as a Service) will help you manage all your cyber security and data privacy obligations in one place. You will gain immediate visibility into critical data and key performance indicators, and stay ahead of regulatory changes. Recently, CyberComply has seen some major updates. But we’re not done yet – the development team is working hard behind the scenes

The post Sam McNicholls-Novoa on CyberComply appeared first on IT Governance UK Blog.

Cybersecurity Tools

A roundup of 2024 predictions, CISO insights

EXECUTIVE SUMMARY: The cyber security landscape is transforming at an exciting, yet sometimes unnerving pace. As the landscape becomes both broad and nuanced, modern CISOs must now sift through a staggering amount of information. Separate the signal from the noise. Prepare for the year ahead with predictions from five of Check Point’s global CISOs. An […]

The post A roundup of 2024 predictions, CISO insights appeared first on CyberTalk.

Cybersecurity Tools

New JaskaGO Malware Stealer Threatens Windows and MacOS Operating Systems

Security researchers discovered a new JaskaGO malware stealer that can infect both Windows and macOS. JaskaGO uses various methods to persist in the infected system. Researchers observed various malware versions impersonating installers for legitimate software like CapCut video editor, AnyConnect, and some security tools. The malware is crafted in Golang (Go) and is part of […]

The post New JaskaGO Malware Stealer Threatens Windows and MacOS Operating Systems appeared first on Heimdal Security Blog.

Cybersecurity Tools

How to Complete an IT Risk Assessment (2023)

In a perfect world, you’d have the resources to defend yourself against every possible cybersecurity threat and vulnerability. The reality, however, is that even the largest organizations have limited resources to dedicate to cybersecurity. An effective security strategy, therefore, needs to put managing risk at the heart of its approach. That’s where IT risk assessments […]

The post How to Complete an IT Risk Assessment (2023) appeared first on Heimdal Security Blog.

Cybersecurity Tools

What is the EPSS score? How to Use It in Vulnerability Prioritization

The Exploit Prediction Scoring System (EPSS) is a data-driven tool highlighting what vulnerabilities hackers will likely exploit. EPSS was created by a group of experts at the Forum of Incident Response and Security Teams (FIRST). Its purpose is to make it easier for security teams to prioritize vulnerability remediation better. Making a better choice of […]

The post What is the EPSS score? How to Use It in Vulnerability Prioritization appeared first on Heimdal Security Blog.

Cybersecurity Tools

Exploring Security Considerations for Fax APIs

In this post, I will be exploring security considerations for Fax APIs. As the digital transformation era continues to shape various aspects of the corporate landscape, businesses need to keep abreast with existing technological advancements. One such innovation involves leveraging Fax Application Programming Interfaces (APIs) to streamline and fortify business communication systems. However, with the […]

The post Exploring Security Considerations for Fax APIs appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

The Surprising VPN Usage Statistics You Need to Know

Here are the surprising VPN usage statistics you need to know. VPN has grown in popularity, leading to the revelation of several facts and stats about VPN usage. How many of these facts do you know? In this post, learn more about VPN facts and statistics and how it impacts you. The use of VPNs […]

The post The Surprising VPN Usage Statistics You Need to Know appeared first on SecureBlitz Cybersecurity.

Scroll to Top