Cyber Security Why Zero Trust is Easier Said Than Done Jun 30, 2022 cyberdefensemagazine.com By John Vecchi, CMO, Anitian Zero trust security has made its way into the offerings of most enterprise […] The…
Technology New YTStealer malware steals accounts from YouTube Creators Jun 29, 2022 bleepingcomputer.com A new information-stealing malware named YTStealer is targeting YouTube content creators and attempting to steal their authentication tokens and hijack…
Technology Clever phishing method bypasses MFA using Microsoft WebView2 apps Jun 26, 2022 bleepingcomputer.com A clever, new phishing technique uses Microsoft Edge WebView2 applications to steal victim's authentication cookies, allowing threat actors to bypass…
Cyber Security 7 Steps to Stronger SaaS Security Jun 24, 2022 darkreading.com Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility…
Cyber Security How the Cloud Upended Security – and How Encryption Helps Restore It Jun 22, 2022 cyberdefensemagazine.com By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out […] The…
Technology Cisco says it won’t fix zero-day RCE in end-of-life VPN routers Jun 17, 2022 bleepingcomputer.com Cisco advises owners of end-of-life Small Business RV routers to upgrade to newer models after disclosing a remote code execution…
Technology Sophos Firewall zero-day bug exploited weeks before fix Jun 16, 2022 bleepingcomputer.com Chinese hackers used a zero-day exploit for a critical-severity vulnerability in Sophos Firewall to compromise a company and breach cloud-hosted…
Technology New MaliBot Android banking malware spreads as a crypto miner Jun 16, 2022 bleepingcomputer.com Threat analysts have discovered a new Android malware strain named MaliBot, which poses as a cryptocurrency mining app or the…
Cyber Security Android Spyware ‘Hermit’ Discovered in Targeted Attacks Jun 16, 2022 darkreading.com The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Technology Anker Eufy smart home hubs exposed to RCE attacks by critical flaw Jun 16, 2022 bleepingcomputer.com Anker's central smart home device hub, Eufy Homebase 2, was vulnerable to three vulnerabilities, one of which is a critical…
Why Zero Trust is Easier Said Than Done
By John Vecchi, CMO, Anitian Zero trust security has made its way into the offerings of most enterprise […] The…
New YTStealer malware steals accounts from YouTube Creators
A new information-stealing malware named YTStealer is targeting YouTube content creators and attempting to steal their authentication tokens and hijack…
Clever phishing method bypasses MFA using Microsoft WebView2 apps
A clever, new phishing technique uses Microsoft Edge WebView2 applications to steal victim's authentication cookies, allowing threat actors to bypass…
7 Steps to Stronger SaaS Security
Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility…
How the Cloud Upended Security – and How Encryption Helps Restore It
By Tilo Weigandt, co-founder, Vaultree Data is everywhere and anywhere, and as a result, data management is out […] The…
Cisco says it won’t fix zero-day RCE in end-of-life VPN routers
Cisco advises owners of end-of-life Small Business RV routers to upgrade to newer models after disclosing a remote code execution…
Sophos Firewall zero-day bug exploited weeks before fix
Chinese hackers used a zero-day exploit for a critical-severity vulnerability in Sophos Firewall to compromise a company and breach cloud-hosted…
New MaliBot Android banking malware spreads as a crypto miner
Threat analysts have discovered a new Android malware strain named MaliBot, which poses as a cryptocurrency mining app or the…
Android Spyware ‘Hermit’ Discovered in Targeted Attacks
The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Anker Eufy smart home hubs exposed to RCE attacks by critical flaw
Anker's central smart home device hub, Eufy Homebase 2, was vulnerable to three vulnerabilities, one of which is a critical…