Firewall daily
Read the latest cybersecurity news, briefs, and in-depth analysis.
-
BlackByte Claims Alleged Modern Automotive Network Cyberattack
The timing and scale of these cyberattacks highlight the vulnerabilities within the automotive and retail sectors. by Ashish Khaitan July…
-
US Department Of Treasury Effort To Secure Financial Cloud
The CESG model represents an unprecedented level of public-private partnership between Treasury, FBIIC, FSSCC, and CSPs. by Samiksha Jain July…
-
Japan-Based Real Estate Company SUUMO Suffers Data Breach
The firm's parent company had faced recent scrutiny from the Education Ministry over data mishandling practices. by Alan J July…
-
23andMe Reaches Settlement In Data Breach Lawsuit
The settlement marks a significant step in addressing the fallout from the data breach that stoked fears of targeted attacks…
-
Gemini AI’s 6,000 Cybersecurity Prompts Will Help Your Security Career
The downloadable library of over 6,000 prompts built with Google Gemini is designed to guide cybersecurity professionals through the NIST…
-
Fin7 CyberCriminal Gang Sells Tools To Evade EDR Detection
The group sells and distributes several of these EDR bypass tools across underground forums. by Alan J July 17, 2024…
-
Hackney Council Reprimanded For ‘Avoidable’ Data Breach
Exposed passwords and incompetent patch management exposed the sensitive data of 280,000 residents by Mihir Bagwe July 17, 2024 Share…
-
Li.Fi Hacked Again: DeFi Users Lose $10 Million
Hackers leveraged a vulnerability to drain nearly $10 million worth of cryptocurrency from unsuspecting users' wallets. by Krishna Murthy July…
-
Decoding The HugeGraph Vulnerability (CVE-2024-27348)
Apache Software Foundation urges upgrading to HugeGraph-Server 1.3.0 for critical security fixes and enhanced reflection filtering in HugeSecurityManager. by Ashish…
-
CERT-In Warns Adobe, IBM WebSphere, And Joomla Users
These vulnerabilities can be exploited by attackers to steal data, deface websites, gain unauthorized access to systems, or even execute…
-
Atturra Acquires Exent To Expand National Footprint
The transaction is slated for completion by the end of July 2024, subject to customary closing conditions. by Samiksha Jain…
-
Ransomware Landscape In Q2 2024: Trends And Challenges
The ransomware landscape in Q2 2024 has highlighted the need for organizations to prioritize cybersecurity as a strategic imperative. by…
-
VirtualBox VM Escape: Insights And Mitigation Strategies
This exploit targets VirtualBox version 7.0 (18-15) and affects both Linux host and guest systems, showcasing its broad impact. by…
-
Kaspersky Goodbye Letter: Free Security Before Exit
Kaspersky Lab's farewell to its American customers marks the end of an era for the company in the U.S. by…
-
Void Banshee Exploits Legacy Internet Explorer In Attack
While Microsoft has released an update patch, experts fear many systems may remain vulnerable. by Alan J July 17, 2024…
-
Beware The Spyware Threat: 10 Signs Your Device Is Infected
If your device is infected with spyware and your previous protections are compromised, here are warning signs to help you…
-
Phishing Attacks: Detect And Mitigate With Expert Tips
Phishing attacks are currently the most widespread cyber threat and their frequency continues to increase. by Editorial July 17, 2024…
-
EU And Ukraine Forge Stronger Cybersecurity Partnership
Kyiv will align its legislation with the EU's Network and Information Security (NIS) 2 Directive, strengthening critical infrastructure and supply…
-
Iranian Group MuddyWater Switches To MuddyRot Malware
The MuddyRot malware supports various commands, including file upload and download, reverse shell, and process kill. by Alan J July…
-
Philippine Department Of Migrant Workers Switches To Manual Systems After Attack
The department had set up alternative channels for overseas Filipino workers (OFWs) to process required activities. by Alan J July…
-
Squarespace Domain Hijacking: Crypto Businesses Targeted
Squarespace users who migrated their domains from Google Domains last year are advised to be cautious, as a security flaw…
-
Medius Appoints Fahmi Megdiche As CISO
Based in France, Megdiche will be at the helm of Medius’ cybersecurity strategy, focusing on fortifying key areas such as…
-
GenAI: The Game Changer For Faster, Smarter Incident Response
GenAI with its ability to simulate potential attack situations and generate real-time responses, can automate and enhance the overall threat…
-
Cyber Risk Management: IT Pros Vs C-Suite Insights
The study shows a cybersecurity knowledge gap between IT professionals and non-IT leaders. Effective CISO-executive communication is critical for tackling…
-
Jellyfish Loader: New Malware With Stealthy Tactics
Jellyfish Loader, a new shellcode malware discovered by Cyble Research, showcases its capabilities, C&C communications, and offers cybersecurity advice to…
-
Don’t Miss Out! Australia’s CIRMP Filing Starts July 1
The Australian government is implementing stricter cybersecurity measures by mandating critical infrastructure operators to develop and maintain a cybersecurity framework.…
-
Pradeep Kumar Joins NST Cyber As Chief Product Architect
Pradeep Kumar joins NST Cyber from IBM, where he excelled as Chief Architect, specializing in the development of large-scale, multi-tenant…
-
Medius Appoints Fahmi Megdiche As New CISO
Medius is well-known for its autonomous, AI-driven AP and spend management solutions designed to eliminate fraud and inefficiencies in business…
-
CISA Advisory On GeoServer And GeoTools Vulnerabilities
GeoServer and GeoTools versions before 2.23.6, 2.24.0-2.24.3, and 2.25.0-2.25.1 are vulnerable with a CVSS score of 9.8 under CVE-2024-36401 and…
-
Why API Security Is Critical In Today’s Interconnected World
PI security covers three key areas: ensuring data confidentiality, guaranteeing content integrity, and enabling secure exchanges among applications, users, and…