Cybersecurity Tools

What Is a Software Restriction Policy?

In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so is by implementing a software restriction policy. But what exactly is a software restriction policy? And how can it benefit your organization? In this article, we will explore the […]

The post What Is a Software Restriction Policy? appeared first on Heimdal Security Blog.

News & Updates

Twitter ‘Shadow Ban’ Flaw Receives Official CVE Number

In a striking development, cybersecurity researcher Federico Andres Lois has
identified a critical bug in Twitter’s source code that could let threat actors
manipulate the platform’s algorithm and suppress posts from appearing on users’
feeds.

The flaw, dubbed the “Shadow Ban” bug, has been assigned a CVE (Common
Vulnerabilities and Exposures) number to highlight its significance, and is now
tracked as CVE-2023-29218
[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29218].

Its full des

News & Updates

Cybercrooks posing as the Easter bunny? Here are 5 tips cybersecurity tips to safeguard your identity and money

Easter bunnies, Easter egg hunts, traveling and family get-togethers are things
we all look forward to during the Easter Holiday. However, as you eagerly
anticipate celebrating with friends and family, shopping and travelling,
fraudsters are planning to catch you off guard.

Every year during the Easter period, cybercriminals launch attacks on unwary
internet users, exploiting online behaviors, holiday cheer and generosity.

What you can expect this Easter:

* Easter-themed spam which may inclu

Security

Weekly Update 342

Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book

News & Updates

CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws affecting products from Hitachi Energy, mySCADA Technologies, Industrial Control Links, and Nexx.
Topping the list is CVE-2022-3682 (CVSS score: 9.9), impacting Hitachi Energy’s MicroSCADA System Data Manager SDM600 that could allow an
News & Updates

Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of Cobalt Strike by cybercriminals to distribute malware, including ransomware.
To that end, the tech giant’s Digital Crimes Unit (DCU) revealed that it secured a court order in the U.S. to “remove illegal, legacy copies of Cobalt Strike so they can no longer be used by
News & Updates

Are Source Code Leaks the New Threat Software vendors Should Care About?

Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing platform GitHub by sending a copyright infringement notice to take down the incriminated repository. The latter is now inaccessible, but according to the media, it was accessible to the public for several months. A user going by the name FreeSpeechEnthousiast committed
News & Updates

Fight AI With AI

By developing new tools to defend against adversarial AI, companies can help ensure that AI is developed and used in a responsible and safe manner.
News & Updates

Seized Genesis malware market’s infostealers infected 1.5 million computers

Infamous hacker marketplace Genesis, which was taken down this week by an international law enforcement operation involving 17 countries, was selling access to millions of victim computers gained via the DanaBot infostealer and likely other malware.

Trellix, the cybersecurity firm that assisted in the takedown of the Genesis site, said that malware used by Genesis provided access to browser fingerprints, cookies, autofill form data, and other credentials.

“The disruption of Genesis Market is yet another successful takedown that proves that public-private partnerships are vital in fighting cybercrime,” said John Fokker, head of threat intelligence at the Trellix Advanced Research Center in Amsterdam. “We had been monitoring the marketplace for many years now and are proud to have been able to play a part in the takedown of this notorious market.”

To read this article in full, please click here

Scroll to Top