Balaji

Balaji

Storage And Backup Cyber Resiliency – CISOs Guide 2024Storage And Backup Cyber Resiliency – CISOs Guide 2024

Storage And Backup Cyber Resiliency – CISOs Guide 2024

CISOs rely on information about security from across the organization, particularly from the various IT departments. Unfortunately, the information being…

2 years ago
Ransomware Actors Exploiting Legitimate System Tools to Gain Access – FBIRansomware Actors Exploiting Legitimate System Tools to Gain Access – FBI

Ransomware Actors Exploiting Legitimate System Tools to Gain Access – FBI

Ransomware attacks are on the rise, causing organizations to lose millions of dollars, restricting them from accessing their data, and possibly…

2 years ago
Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOSAndroid Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most…

2 years ago
Iranian APT Hackers Attacking Education & Tech Sectors to Steal Sensitive DataIranian APT Hackers Attacking Education & Tech Sectors to Steal Sensitive Data

Iranian APT Hackers Attacking Education & Tech Sectors to Steal Sensitive Data

Cybersecurity researchers link attackers to the Iranian-backed APT group "Agonizing Serpens," which has upgraded its capabilities and uses various tools…

2 years ago
QNAP OS Command Injection Vulnerability Let Attackers Execute Malicious CommandsQNAP OS Command Injection Vulnerability Let Attackers Execute Malicious Commands

QNAP OS Command Injection Vulnerability Let Attackers Execute Malicious Commands

Two critical OS command injection flaws have been discovered in multiple QNAP products, which include QTS, Multimedia Console, Media Streaming…

2 years ago
Veeam Critical Flaws Let Attackers Execute Remote Code and Steal NTLM HashesVeeam Critical Flaws Let Attackers Execute Remote Code and Steal NTLM Hashes

Veeam Critical Flaws Let Attackers Execute Remote Code and Steal NTLM Hashes

Veeam, a Global Leader in Data Protection, issued hotfixes to address four vulnerabilities affecting the Veeam ONE IT infrastructure monitoring and analytics platform.…

2 years ago
Cisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS AttackCisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS Attack

Cisco AnyConnect SSL VPN Flaw Let Remote Attacker Launch DoS Attack

A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL…

2 years ago
Uncovering Prolific Puma, Massive Domain Generator & URL ShortenerUncovering Prolific Puma, Massive Domain Generator & URL Shortener

Uncovering Prolific Puma, Massive Domain Generator & URL Shortener

Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and…

2 years ago
Prepare Your Employees to Withstand a Zero-Day Cyber Attack: 5 Key StrategiesPrepare Your Employees to Withstand a Zero-Day Cyber Attack: 5 Key Strategies

Prepare Your Employees to Withstand a Zero-Day Cyber Attack: 5 Key Strategies

Imagine walking into work one morning to find your company's network completely crippled. Servers are down, workstations display ransomware notices,…

2 years ago
Android Malware Masquerades as Chrome Browser Reads SMS & Intercepts EmailsAndroid Malware Masquerades as Chrome Browser Reads SMS & Intercepts Emails

Android Malware Masquerades as Chrome Browser Reads SMS & Intercepts Emails

Threat actors primarily target remote access and control of victims' devices by employing deceptive tactics. They often create fake apps…

2 years ago