admin

Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broad Espionage Campaign

Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broad Espionage Campaign

U.S. telecom giant T-Mobile recently confirmed that it was targeted by Chinese threat actors in a sophisticated cyber campaign. The adversaries, known as Salt Typhoon, sought to gain access to valuable information, particularly focusing on cellphone communications of "high-value intelligence targets." This article dives into the incident, its implications, and how companies can protect themselves…

Read More
CISA Alert: Exploitation of VMware vCenter and Kemp LoadMaster Vulnerabilities

CISA Alert: Exploitation of VMware vCenter and Kemp LoadMaster Vulnerabilities

Active Exploitation of Vulnerabilities in Progress Kemp LoadMaster Recently, serious security flaws affecting Progress Kemp LoadMaster and VMware vCenter Server have been reported as actively exploited in the wild. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-1212 to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability has a CVSS score of 10.0,…

Read More
Poznani 888 domnevno trdijo, da so razkrili kršitev podatkov Appleton Harley-Davidson. #kibernetskavarnost #podatkovnakrsitev #kibernetskikriminalci

Poznani 888 domnevno trdijo, da so razkrili kršitev podatkov Appleton Harley-Davidson. #kibernetskavarnost #podatkovnakrsitev #kibernetskikriminalci

Zloglasna kibernetska kriminalna skupina, znana kot “888,” je razkrila občutljive podatke Appleton Harley-Davidson, vodilnega prodajalca motorjev. Ta podatkovna kršitev je sprožila velike skrbi o kibernetski varnosti in zaščiti podatkov znotraj podjetja. Kršitev naj bi razkrila osebne podatke skoraj 20.000 strank, kar je povzročilo pomisleke o varnosti podatkov in zasebnosti. Ta incident ponazarja, kako ranljiva so…

Read More
New Stealthy BabbleLoader Malware Unveiled: Beware of WhiteSnake and Meduza Stealers

New Stealthy BabbleLoader Malware Unveiled: Beware of WhiteSnake and Meduza Stealers

Understanding BabbleLoader: The Stealthy Malware Loader Cybersecurity researchers have recently uncovered detailed information about a new stealthy malware loader known as BabbleLoader. This sophisticated loader has been observed in real-world scenarios delivering various information stealer families, including WhiteSnake and Meduza. BabbleLoader is designed to remain under the radar, making it extremely challenging to detect. What…

Read More
The Challenge of Non-Human Identities: Why Credential Remediation Takes More Time

The Challenge of Non-Human Identities: Why Credential Remediation Takes More Time

Understanding the Secrets Leak Problem in IT According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% from the previous year’s report. In the digital landscape, the number of leaked credentials has reached alarming levels, with over 12.7 million hardcoded credentials found in public GitHub…

Read More
Beyond Compliance: The Advantage of Year-Round Network Pen Testing

Beyond Compliance: The Advantage of Year-Round Network Pen Testing

The Importance of Regular Network Penetration Testing for IT Leaders IT leaders understand the crucial role of network penetration testing in today’s cyber landscape. Regulators and cyber insurers often mandate this testing to fortify defenses against cybercriminals. However, it’s essential to consider that hackers do not wait for compliance schedules. They are continuously probing for…

Read More
Enhancing Email Privacy: How Gmail's New Shielded Email Feature Allows Users to Create Aliases

Enhancing Email Privacy: How Gmail’s New Shielded Email Feature Allows Users to Create Aliases

Google’s New Shielded Email Feature: Combatting Spam with Ease Google is gearing up to launch an exciting new feature: Shielded Email. This initiative allows users to create unique email aliases when signing up for various online services, significantly enhancing privacy and reducing spam. With the rise of unwanted emails, Shielded Email could be a game-changer…

Read More
THN Recap: Top Cybersecurity Threats, Tools, and Best Practices

THN Recap: Top Cybersecurity Threats, Tools, and Best Practices

Understanding Cybercrime: A Closer Look What do hijacked websites, fake job offers, and sneaky ransomware have in common? They demonstrate how cybercriminals are finding smarter, sneakier ways to exploit both systems and people. This reality underscores a crucial point: no system, person, or organization is truly off-limits to these attackers. Today's cybercriminals are becoming increasingly…

Read More