ICYMI: 2023-09-05
Latest Headlines
New BLISTER Malware Update Fuelling Stealthy Network Infiltration
New Python Variant of Chaes Malware Targets Banking and Logistics Industries
Way Too Vulnerable: Join this Webinar to Understand and Strengthen Identity Attack Surface
Key Cybersecurity Tools That Can Mitigate the Cost of a Breach
Researchers Warn of Cyber Weapons Used by Lazarus Group’s Andariel Cluster
Meta Takes Down Thousands of Accounts Involved in Disinformation Ops from China and Russia
MITRE and CISA Release Open Source Tool for OT Attack Emulation
9 Vulnerabilities Patched in SEL Power System Management Products
Norfolk Southern Says a Software Defect — Not a Hacker — Forced It to Park Its Trains This Week
Developers Warned of Malicious PyPI, NPM, Ruby Packages Targeting Macs
Cybersecurity M&A Roundup: 40 Deals Announced in August 2023
Ransomware Attack on Fencing Systems Maker Zaun Impacts UK Military Data
AttackCrypt: A Payload Encryptor That Allows Malware to Evade Antivirus Scanners
What is Zero Trust Data Access? – Zero Trust in the SaaS Guide
shelLM – A New AI-Based Honeypot to Engage Attackers as a Real System
Freecycle Urges Users to Change Passwords Following Data Breach
Hackers Exploit Pre-Authentication RCE Vulnerabilities in Adobe ColdFusion
Coffee Meets Bagel says recent outage caused by destructive cyberattack
Atlas VPN zero-day vulnerability leaks users’ real IP address
Crypto casino Stake.com loses $41 million to hot wallet hackers
Chaes malware now uses Google Chrome DevTools Protocol to steal data
ASUS routers vulnerable to critical remote code execution flaws
Continuous Security: PTaaS Bridges the Gap within Application Security
– MTZ