Category: Viral

Aug 14, 2024The Hacker NewsPassword Security / Cyber Security Simply relying on traditional password security measures is no longer sufficient. When it comes to protecting your organization from credential-based attacks, it is essential to lock down the basics first. Securing your Active Directory should be a priority – it is like making sure a house…

Read More

Scams Your phone number is more than just a way to contact you – scammers can use it to target you with malicious messages and even exploit it to gain access to your bank account or steal corporate data 13 Aug 2024  •  , 5 min. read Last month, we looked at how scammers can…

Read More

Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of 2024 provides detailed insights into DDoS attack data, showcasing changes in attack patterns and the broader landscape of cyber threats. Here, we share a selection of findings from the full report. Key…

Read More

Aug 14, 2024Ravie LakshmananThreat Intelligence / Cyber Attack The China-backed threat actor known as Earth Baku has diversified its targeting footprint beyond the Indo-Pacific region to include Europe, the Middle East, and Africa starting in late 2022. Newly targeted countries as part of the activity include Italy, Germany, the U.A.E., and Qatar, with suspected attacks…

Read More

Aug 14, 2024Ravie LakshmananVulnerability / Network Security Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could be exploited to achieve an authentication bypass and create rogue administrative users. The vulnerability, tracked as CVE-2024-7593, has a CVSS score of 9.8 out of a maximum of 10.0. “Incorrect implementation…

Read More

Bloomberg reported that, even without the divestitures, the government will likely seek a ban of the “exclusive distribution agreements” at the heart of the case. The U.S. Department of Justice is considering a divestiture of Google’s Android operating system, AdWords ad sales platform and web browser, Chrome, after a judge ruled the tech giant is…

Read More

Major IT companies looking to expand their technology portfolios and private equity firms buying IT vendors and solution providers account for many of the biggest mergers and acquisitions this year. And AI is a factor in many acquisitions. Here’s a look at the biggest tech mergers and acquisitions that have been announced, completed or are…

Read More

7Critical 80Important 1Moderate 0Low Microsoft addresses 88 CVEs with seven critical vulnerabilities and 10 zero-day vulnerabilities, six of which were exploited in the wild. Microsoft patched 88 CVEs in its August 2024 Patch Tuesday release, with seven rated critical, 80 rated as important, and one rated as moderate. This month’s update includes patches for: .NET…

Read More

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-38189 Microsoft Project Remote Code Execution Vulnerability CVE-2024-38178 Microsoft Windows Scripting Engine Memory Corruption Vulnerability CVE-2024-38213 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability CVE-2024-38193 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability CVE-2024-38106 Microsoft Windows Kernel Privilege Escalation Vulnerability CVE-2024-38107 Microsoft Windows…

Read More

Broadcom’s security business can now move its own deals and products via select distributors known as “Catalyst” partners. TD Synnex and Carahsoft are designated in the Americas and for government. Broadcom’s enterprise security business is designating some distributors as “Catalyst” partners and allowing them to create and deliver their own product and deal offerings to…

Read More