Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications https://firewall.firm.in/wp-content/uploads/2024/05/malware.png May 03, 2024NewsroomCloud Security / Threat Intelligence Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to “facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services,” the Symantec Threat Hunter Team, part of Broadcom, said ...
Read More »Vulnerabilities & Exploits
Remote work leads to massive surge in hacking globally: Report – ET CISO
Remote work leads to massive surge in hacking globally: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-82601146,imgsize-22919,width-1200,height=765,overlay-etciso/news/remote-work-leads-to-massive-surge-in-hacking-globally-report.jpg New York, With most people working from home, due to the Coronavirus pandemic, there has been a surge in cyber crime. The year 2021 saw 5,258 data breaches across the globe, a third more breaches analysed than last year, according to a report on Thursday. The ...
Read More »Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back
Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back https://firewall.firm.in/wp-content/uploads/2024/05/ddos.jpg May 03, 2024The Hacker NewsLive Webinar / Server Security In today’s rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking ...
Read More »Here’s how CISOs can haul their organisations towards cyber resilience – ET CISO
Here’s how CISOs can haul their organisations towards cyber resilience – ET CISO https://etimg.etb2bimg.com/thumb/msid-84546030,imgsize-59938,width-1200,height=765,overlay-etciso/news/heres-how-cisos-can-haul-their-organisations-towards-cyber-resilience.jpg India has always been a soft target just like any other country, as systems are developed keeping the business needs in mind, not security in view. Back around 2010-2015, many e-commerce applications and payment gateways were breached but never advertised or spoken about. However, several reasons ...
Read More »New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data
New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data https://firewall.firm.in/wp-content/uploads/2024/05/layer.png May 03, 2024The Hacker NewsSaaS Security / Browser Security SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business. At the same time, these applications also pose a new security risk that security leaders ...
Read More »Protect Your Business From These Dangerous Data Breach Trends – ET CISO
Protect Your Business From These Dangerous Data Breach Trends – ET CISO https://etimg.etb2bimg.com/thumb/msid-84786293,imgsize-4126751,width-1200,height=765,overlay-etciso/news/protect-your-business-from-these-dangerous-data-breach-trends.jpg 2020 was an unprecedented year in many ways, and data breaches were no exception. According to fraud detection vendor SpyCloud’s 2021 Annual Credential Exposure Report, there were 33% more breach sources in 2020 compared to 2019. Of those breaches, there were at least 1,486,416,779 stolen credentials in ...
Read More »Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks https://firewall.firm.in/wp-content/uploads/2024/05/hpe.png May 03, 2024NewsroomVulnerability / Software Security HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems. Of the 10 security defects, four are rated critical in severity – CVE-2024-26304 (CVSS score: 9.8) ...
Read More »Spies for Hire: China’s new breed of hackers blends espionage and entrepreneurship – ET CISO
Spies for Hire: China’s new breed of hackers blends espionage and entrepreneurship – ET CISO https://etimg.etb2bimg.com/thumb/msid-85680968,imgsize-30538,width-1200,height=765,overlay-etciso/news/spies-for-hire-chinas-new-breed-of-hackers-blends-espionage-and-entrepreneurship.jpg China’s buzzy high-tech companies do not usually recruit Cambodian speakers, so the job ads for three well-paid positions with those language skills stood out. The ad, seeking writers of research reports, was placed by an internet security startup in China’s tropical island-province of Hainan. ...
Read More »Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw https://firewall.firm.in/wp-content/uploads/2024/05/apps.png May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory. “The implications of this vulnerability pattern include arbitrary ...
Read More »Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO
Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773721,imgsize-874584,width-1200,height=765,overlay-etciso/corporate/zero-day-vulnerabilities-becoming-major-source-of-cyberattacks-verizon.jpg Cyberattacks stemming from exploitation of vulnerabilities for accessing data have shot up by a staggering 180% in 2023 and almost tripled over the past year, a new study has revealed. The growth is majorly fueled by the MOVEit vulnerability where hackers exploited a zero-day vulnerability in the MOVEit ...
Read More »