New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
May 26, 2023Ravie LakshmananICS/SCADA Security
A new strain of malicious software that's engineered to penetrate and disrupt critical systems in industrial environments has been...
Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
May 26, 2023Ravie LakshmananEmail Security / Zero-Day
Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it...
New PowerExchange Backdoor Used in Iranian Cyber Attack on UAE Government
May 25, 2023Ravie LakshmananEmail Security / Exploit
An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted by a likely Iranian...
Cynet Protects Hospital From Lethal Infection
May 25, 2023The Hacker NewsIncident Response
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in...
Zyxel Issues Critical Security Patches for Firewall and VPN Products
May 25, 2023Ravie LakshmananNetwork Security / Vulnerability
Zyxel has released software updates to address two critical security flaws affecting select firewall and VPN products...
Dark Frost Botnet Launches Devastating DDoS Attacks on Gaming Industry
May 25, 2023Ravie LakshmananGaming / Server Security
A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS) attacks against the gaming...
What are the Common Security Challenges CISOs Face?
Chief Information Security Officers (CISOs) hold a critical and challenging role in today’s rapidly evolving cybersecurity landscape. Here are the common security challenges CISOs...
Alert: Brazilian Hackers Targeting Users of Over 30 Portuguese Banks
May 25, 2023Ravie LakshmananFinancial Security / Cyber Threat
A Brazilian threat actor is targeting more than 30 Portuguese financial institutions with information-stealing malware as...
Wireshark 4.0.6 Released – Fix for 9 vulnerabilities
Wireshark is a free and open-source network packet analyzer used by people worldwide. It has a wide range of uses when it comes to...
China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected
May 25, 2023Ravie LakshmananCyber Threat / Espionage
A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations in the U.S....