Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM
An intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations.IDS also can...
Hackers Using Remote Admin Tools To Compromise Organizations With Ransomware
Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools.This method allowed the malware to spread...
Hackers Deliver Weaponized Notepad++ Via Google Ads
Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead to the dissemination of...
Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account
Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default Linux users: 'admin' and...
Raven: Open-source CI/CD Pipeline Vulnerability Scanner Tool
Cycode is excited to introduce Raven, a state-of-the-art security scanner for CI/CD pipelines. Raven stands for Risk Analysis and Vulnerability Enumeration for CI/CD Pipeline Security,...
Researchers Uncovered a New Flaw in ChatGPT to Turn Them Evil
LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use "alignment" methods via finetuning to prevent...
Threat Actors Abuse Discord to Blend Within Organizations’ Network Traffic
Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform to chat, share, and collaborate....
Microsoft to Kill NTLM and Expand Kerberos Authentication
In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world, user authentication, a cornerstone...
Pro-Russia Hacker Groups Exploiting Winrar Flaw to Steal Login Credentials
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831 using a Powershell script...
Okta Support System Hacked, Users Sensitive Data Exposed
The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta's support case management system. An attacker was able...