Fraud tactics and the growing prevalence of AI scams
In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107 million spam calls everyday. The data showed spam flag rates…
Operational Security | Cybersecurity & more!
In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107 million spam calls everyday. The data showed spam flag rates…
Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd, and Wallarm. Own proactively detects and stores data changes in…
Keywords/Tags: Data Breaches, Ransomware, Colonial Pipeline, Halliburton, ransomware Article Source: SecurityWeek US oil giant Halliburton confirmed its computer systems were hit by a cyberattack that affected operations at its Houston…
Keywords/Tags: Nation-State, Network Security, Vulnerabilities, Cisco, vulnerability Article Source: SecurityWeek Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS…
Keywords/Tags: Malware & Threats, Vulnerabilities, CVE-2021-44228, Datadog, Log4j, Log4Shell Article Source: SecurityWeek More than two years after the Log4j crisis, organizations are still being hit by crypto-currency miners and backdoor…
Keywords/Tags: Cybercrime, Ransomware Article Source: SecurityWeek Ransomware isn’t just about malware. It’s about brands, trust, and the shifting allegiances of cybercriminals. The post Understanding the ‘Morphology’ of Ransomware: A Deeper…
A critical vulnerability (CVE-2024-6800) affecting all currently supported versions of GitHub Enterprise Server (GHES) may allow attackers to gain unrestricted access to the instance’s contents. The issue, reported via the…
Keywords/Tags: Vulnerabilities, Atlassian Article Source: SecurityWeek Atlassian has released patches for nine high-severity vulnerabilities in Bamboo, Confluence, Crowd, and Jira products. The post Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd,…
Keywords/Tags: Vulnerabilities, CISA KEV, exploited Article Source: SecurityWeek CISA warns that attackers are exploiting two critical-severity authentication bypass vulnerabilities impacting multiple Dahua products. The post CISA Warns of Exploited Vulnerabilities…
Keywords/Tags: Management & Strategy, Acquisition, CrowdStrike Article Source: SecurityWeek CrowdStrike has denied having any significant acquisition talks with patch management firm Action1 following rumors of a $1 billion deal. The…