Hackers Use Rare Stealth Techniques to Down Asian Military, Gov’t Orgs
A threat actor resembling APT41 performed “AppDomainManager Injection,” which is like DLL sideloading, but arguably easier and stealthier. A threat…
Cybercriminals Tap Greasy Opal to Create 750M Fake Microsoft Accounts
Such cyberattack enablement services let attackers breach security measures, establish new fake accounts, and brute-force servers. Such cyberattack enablement services…
Seattle-Tacoma Airport Suffers System Outages Due to Possible Cyberattack
As the entire Port of Seattle struggles to become fully operational once more, the airport recommends that those who are…
Dutch Regulator Fines Uber €290 Million for GDPR Violations in Data Transfers to U.S.
The Dutch Data Protection Authority (DPA) has fined Uber a record €290 million ($324 million) for allegedly failing to comply…
SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access
SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited, could grant malicious…
Aggressively Monitoring for Changes Is a Key Aspect of Cybersecurity
Employees and management must fully support change detection and file integrity monitoring, allowing a proactive approach with definitive security controls…
Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration
Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of security and…
Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms
Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of…