Cybersecurity Tools

MSI Breach Claimed By Money Message Ransomware Gang

A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as ‘Money Message’. The threat actors claim to have stolen source code from the company’s network. MSI is one of the most well-known names in the global hardware market, producing […]

The post MSI Breach Claimed By Money Message Ransomware Gang appeared first on Heimdal Security Blog.

News & Updates

Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike

Microsoft announced it has taken legal action to disrupt the illegal use of copies of the post-exploitation tool Cobalt Strike by cybercriminals. Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. The Beacon includes a wealth of functionality for the attacker, including, but […]

The post Microsoft aims at stopping cybercriminals from using cracked copies of Cobalt Strike appeared first on Security Affairs.

Cybersecurity Tools

What Is a Software Restriction Policy?

In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so is by implementing a software restriction policy. But what exactly is a software restriction policy? And how can it benefit your organization? In this article, we will explore the […]

The post What Is a Software Restriction Policy? appeared first on Heimdal Security Blog.

News & Updates

Twitter ‘Shadow Ban’ Flaw Receives Official CVE Number

In a striking development, cybersecurity researcher Federico Andres Lois has
identified a critical bug in Twitter’s source code that could let threat actors
manipulate the platform’s algorithm and suppress posts from appearing on users’
feeds.

The flaw, dubbed the “Shadow Ban” bug, has been assigned a CVE (Common
Vulnerabilities and Exposures) number to highlight its significance, and is now
tracked as CVE-2023-29218
[https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29218].

Its full des

News & Updates

Cybercrooks posing as the Easter bunny? Here are 5 tips cybersecurity tips to safeguard your identity and money

Easter bunnies, Easter egg hunts, traveling and family get-togethers are things
we all look forward to during the Easter Holiday. However, as you eagerly
anticipate celebrating with friends and family, shopping and travelling,
fraudsters are planning to catch you off guard.

Every year during the Easter period, cybercriminals launch attacks on unwary
internet users, exploiting online behaviors, holiday cheer and generosity.

What you can expect this Easter:

* Easter-themed spam which may inclu

Security

Weekly Update 342

Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book

News & Updates

CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws affecting products from Hitachi Energy, mySCADA Technologies, Industrial Control Links, and Nexx.
Topping the list is CVE-2022-3682 (CVSS score: 9.9), impacting Hitachi Energy’s MicroSCADA System Data Manager SDM600 that could allow an
Exit mobile version