fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Key MITRE ATT&CK techniques used by cyber attackers - Help Net Security

Key MITRE ATT&CK techniques used by cyber attackers – Help Net Security

Key MITRE ATT&CK techniques used by cyber attackers While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&CK techniques that adversaries abuse most frequently throughout the year, and two […]

Key MITRE ATT&CK techniques used by cyber attackers – Help Net Security Read More »

The effects of law enforcement takedowns on the ransomware landscape - Help Net Security

The effects of law enforcement takedowns on the ransomware landscape – Help Net Security

The effects of law enforcement takedowns on the ransomware landscape While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the August 2023 disruption of the Qakbot botnet has had one notable effect: ransomware affiliates have switched to vulnerability exploitation as the primary method of delivering

The effects of law enforcement takedowns on the ransomware landscape – Help Net Security Read More »

Demystifying a Common Cybersecurity Myth

Demystifying a Common Cybersecurity Myth

One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on their own—this is simply not the case. In our latest whitepaper OPSWAT CEO and Founder, Benny Czarny, takes a comprehensive look at what it takes to prevent malware threats in today’s ever-evolving file upload security landscape, and a

Demystifying a Common Cybersecurity Myth Read More »

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites

A new malware campaign is leveraging a high-severity security flaw in the Popup Builder plugin for WordPress to inject malicious JavaScript code. According to Sucuri, the campaign has infected more than 3,900 sites over the past three weeks. “These attacks are orchestrated from domains less than a month old, with registrations dating back to February

Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites Read More »

How advances in AI are impacting business cybersecurity - Help Net Security

How advances in AI are impacting business cybersecurity – Help Net Security

How advances in AI are impacting business cybersecurity While ChatGPT and Bard have proven to be valuable tools for developers, marketers, and consumers, they also carry the risk of unintentionally exposing sensitive and confidential data. From a security point of view, it always pays to think one step ahead and about what might be coming

How advances in AI are impacting business cybersecurity – Help Net Security Read More »

Cybersecurity jobs available right now: March 12, 2024 - Help Net Security

Cybersecurity jobs available right now: March 12, 2024 – Help Net Security

Cybersecurity jobs available right now: March 12, 2024 CISO / Head of Enterprise IT Stitch Fix | USA | Remote – View job details Reporting directly to the Chief Product and Technology Officer, you will oversee all aspects of information security, including cloud security, DevSecOps, security operations, and security strategy. You’ll also be responsible for

Cybersecurity jobs available right now: March 12, 2024 – Help Net Security Read More »

10 free cybersecurity guides you might have missed - Help Net Security

10 free cybersecurity guides you might have missed – Help Net Security

10 free cybersecurity guides you might have missed This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific guides for various sectors and organizations. Whether you work for a small business, a large corporation, or a specific industry, these guides provide insights into cybersecurity best

10 free cybersecurity guides you might have missed – Help Net Security Read More »

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware

Hackers exploit unpatched Ivanti vulnerabilities to deploy malware on Linux systems. Magnet Goblin targets businesses using outdated software. Patch immediately and implement strong security measures to protect against these attacks. Cybersecurity researchers at Check Point are warning of a malicious campaign targeting one-day vulnerabilities in Ivanti and other security software products, potentially impacting a wide

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware Read More »

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking

Consumer Reports exposes security vulnerabilities in popular video doorbells allowing unauthorized access, stolen footage, and privacy risks. Learn how to protect your home from insecure devices. The video doorbell market has been flooded with a wide variety of brands, devices, versions, and sellers, making it difficult for buyers to find safe and reliable products. To

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking Read More »

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a bogus law enforcement seizure banner. “ALPHV/BlackCat did not get seized. They are exit scamming their affiliates,” security researcher Fabian Wosar said. “It is blatantly obvious when you check the source code of the

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout Read More »

Scroll to Top