The U.S. State Department is offering a reward of up to $10 million for information that could lead to the identification or location of a North Korean military hacker. […]
Meta nukes massive Instagram sextortion network of 63,000 accounts
Meta has removed 63,000 Instagram accounts from Nigeria that were involved in sextortion scams, including a coordinated network of 2,500 accounts linked to 20 individuals targeting primarily adult men in the United States. […]
Chainguard Raises $140 Million, Expands Tech to Secure AI Workloads
Software supply chain security startup Chainguard raises a $140 million Series C round that values the company at $1.2 billion.
The post Chainguard Raises $140 Million, Expands Tech to Secure AI Workloads appeared first on SecurityWeek.
Progress warns of critical RCE bug in Telerik Report Server
Progress Software has warned customers to patch a critical remote code execution security flaw in the Telerik Report Server that can be used to compromise vulnerable devices. […]
French police push PlugX malware self-destruct payload to clean PCs
The French police and Europol are pushing out a “disinfection solution” that automatically removes the PlugX malware from infected devices in France. […]
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country.
Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel Hyatt,
Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel Hyatt,
Why Multivendor Cybersecurity Stacks Are Increasingly Obsolete
Multivendor tech stacks are costly and complex to integrate and manage. Learn more from Cynet about how an All-in-One approach reduces costs for MSPs and SMEs, while offering increased security. […]
BIND Updates Resolve High-Severity DoS Vulnerabilities
The latest BIND security updates address remotely exploitable vulnerabilities leading to denial-of-service.
The post BIND Updates Resolve High-Severity DoS Vulnerabilities appeared first on SecurityWeek.
6 Types of Applications Security Testing You Must Know About
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment.
In this article, we will
In this article, we will
Network of 3,000 GitHub Accounts Used for Malware Distribution
Stargazer Goblin has created a network of over 3,000 GitHub accounts to distribute malware through phishing repositories.
The post Network of 3,000 GitHub Accounts Used for Malware Distribution appeared first on SecurityWeek.
