Pentera launches global partner program to accelerate channel growth

PRESS RELEASE Boston, February 22, 2024 – Artistleader in automated security validation, today announced the launch of its new Partner Program. The global program strengthens Pentera’s channel-centric go-to-market strategy and…

China launches new cyber defense plan for industrial networks

China’s Ministry of Industry and Information Technology (MIIT) released a new strategy this week to improve data security within that of the nation industrial sector. The aim of the plan…

LockBit leak site resurfaces, one week after ‘full compromise’

Operation LockBit ransomware-as-a-service (RaaS) has relaunched its escape site, just a week later a coordinated removal operation by global law enforcement. On February 19, the “Operation Cronos Taskforce” – comprising,…

Fortress Information Security implements the automated patch notification and authenticity tool

PRESS RELEASE ORLANDO, Fla., Feb. 23, 2024 /PRNewswire/ — The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) have clearly…

Banking Trojans Target Latin America and Europe via Google Cloud Run

Cybersecurity researchers are warning of a spike in email phishing campaigns that are using the Google Cloud Run service as a weapon to deliver various banking Trojans such as Astaroth…

Gulf Region Accelerates Zero Trust Adoption

Zero trust security adoption will increase tenfold in the Gulf region by the end of 2025, with critical infrastructure sectors such as finance, oil and gas leading the way. Nader…

Over 8,000 domains of trusted brands hacked in massive spam operations

More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions were compromised as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio Labs…

The next generation of cybersecurity may be hiding in big tech

COMMENT The world is facing an unprecedented number of cyber threats and historically low numbers of cybersecurity personnel. While cybersecurity and IT are not one-to-one industries, software developers, programmers, and…

New IDAT Loader attacks that use steganography to deploy Remcos RAT

February 26, 2024News about hackersSteganography/Malware Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using…

North Korean hackers target developers with malicious npm packages

February 26, 2024News about hackersSoftware Security/Cryptocurrency A number of fake npm packages discovered in the Node.js repository have been found to share ties to North Korean state-sponsored actors, new findings…