admin

Kako Symantec Endpoint Security Complete in Threat Defence for Active Directory Rešujeta NIS2 Direktivo

Uvod v NIS2 direktivo NIS2 direktiva, ki je bila sprejeta s strani Evropske unije, predstavlja pomemben korak k izboljšanju kibernetske varnosti v Evropi. Namenjena je zaščiti omrežij in informacijskih sistemov pred naraščajočimi grožnjami, ki izhajajo iz digitalizacije in povezanosti. Z naraščajočim številom kibernetskih napadov, ki ciljajo na kritično infrastrukturo in podjetja, je NIS2 postala nujna…

Read More

CISA Updates Vulnerabilities List with Twilio Authy and IE Security Exploits

Two Security Flaws Added to CISA’s Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently made an important update by adding two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These additions were made based on evidence that these vulnerabilities are actively being exploited in the wild. Let’s delve into the…

Read More

Unveiling the Latest Microsoft Defender Vulnerability: ACR, Lumma, and Meduza Stealers on the Prowl

Exploited Security Flaw in Microsoft Defender SmartScreen Recently, a security flaw in Microsoft Defender SmartScreen was utilized by cybercriminals in a new campaign aimed at spreading information stealers like ACR Stealer, Lumma, and Meduza. The campaign was detected by Fortinet FortiGuard Labs, with a specific focus on countries such as Spain, Thailand, and the U.S….

Read More

Emojiji: Od čustev do ubežanja – Kako spletni kriminalci prehitijo odkrivanje

Kibernetski kriminalci izkoristijo nedotakljivost emotikonskih simbolov V zadnjem času so kibernetski kriminalci našli nov način za izogibanje detekciji svojih zlonamernih aktivnosti – izkoriščanje emotikonskih simbolov. Emotikoni, priljubljeni dodatki vsakodnevnih komunikacij na spletu, se uporabljajo za prenašanje čustvenih nians, vendar so postali tudi sredstvo za skrivanje kibernetskih napadov. To predstavlja resno grožnjo za računalniško varnost, saj…

Read More

Unveiling the Latest ICS Malware Threat: FrostyGoop Targeting Critical Infrastructure

Cybersecurity Researchers Uncover FrostyGoop Malware Targeting Energy Company in Ukraine Cybersecurity researchers recently uncovered the ninth Industrial Control Systems (ICS)-focused malware called FrostyGoop. This malicious software was used in a disruptive cyber attack targeting an energy company in Lviv, Ukraine, in January. The industrial cybersecurity firm Dragos identified FrostyGoop as the first malware strain to…

Read More

Uncovering the Latest Cyber Threats: HATVIBE and CHERRYSPY Malware Target Ukrainian Institutions

The Spear-Phishing Campaign The Computer Emergency Response Team of Ukraine (CERT-UA) recently issued a warning about a spear-phishing campaign aimed at a scientific research institution within the country. This malicious campaign involved the deployment of two types of malware – HATVIBE and CHERRYSPY. These malware entities were used to infiltrate the targeted institution’s systems and…

Read More