Tag: network security

ATSG, Success Computer Consulting, Zoom, Microsoft, CrowdStrike and Kyndryl were among the tech companies making key executive hires and moves in October 2024. New CEOs of ATSG and Success Computer Consulting and a new CFO at Zoom were among the biggest executive moves in October. Taking those top spots, respectively, were Russell Reeder, formerly with…

Read More

The results from Q3 are ‘further validating our view that the firewall market is recovering,’ Fortinet CFO Keith Jensen said Thursday. Fortinet is once again seeing growth from its firewall business after several quarters of decline in the cybersecurity vendor’s largest segment, executives said Thursday. While specifics on the firewall growth were not disclosed, during…

Read More

‘I think next year, we should be a meaningfully different company for the better, and in two years, we should almost be an unrecognizable company for the better, and that would be the yardstick for success,’ said Cisco’s Chief Product Officer Jeetu Patel. Cisco Systems is undergoing a transformation, and that’s within its leadership ranks,…

Read More

SonicWall CEO Bob VanKirk tells CRN that the launch of a major new SMB firewall is just the latest in a series of moves this year focused on ‘transformation’ of the company. SonicWall’s unveiling of a major new SMB firewall Thursday is just the latest in a series of moves this year focused on “transformation”…

Read More

Nov 07, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the European Union, marking the first time the hacking crew has targeted an entity in the region. “During this attack, the threat actor used as a lure the upcoming World Expo, which…

Read More

Nov 07, 2024The Hacker NewsPassword Security / Network Security Defending your organization’s security is like fortifying a castle—you need to understand where attackers will strike and how they’ll try to breach your walls. And hackers are always searching for weaknesses, whether it’s a lax password policy or a forgotten backdoor. To build a stronger defense,…

Read More

A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware capable of infecting Apple macOS devices. Cybersecurity company SentinelOne, which dubbed the campaign Hidden Risk, attributed it with high confidence to BlueNoroff, which has been previously linked to malware families such as…

Read More

Nov 07, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up thousands of downloads for over three years while stealthily exfiltrating developers’ Amazon Web Services (AWS) credentials. The package in question is “fabrice,” which typosquats a popular Python library known as “fabric,”…

Read More

An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking the large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East Asia, and South America. “The campaign impersonates dozens of…

Read More

Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them a reliable way to identify specific cyber threats. Here are some of the most commonly used techniques, according to ANY.RUN’s Q3 2024 report on malware trends, complete with real-world examples. Disabling of…

Read More