Stay current with latest developments in the hacking world. Explore topics, ranging from threats and breaches including data breaches to password hacks to malware. Readers can find posts updated hourly covering incidents around the world authored by some of leading experts and contributors in Cybersecurity industry.
Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader
We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike ...
Data Breaches for the Month August 2024
This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines. These incidents have not only exposed sensitive information but also highlighted... The post ...
Missing Guardrails, a Troubling Trend in Data Protection
An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks ...
Security Boulevard
Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24
David Lindner, Director, Application Security | | 2fa, cyberespionage, MFA, Thought Leaders, Vulnerability Disclosure
Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
Radware Report Surfaces Increasing Waves of DDoS Attacks
A report by Radware finds that DDoS attacks are increasing not only in number and volume, some lasting as long as 100 hours over six days ...
Security Boulevard
Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives
Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...
3CX Phone System Local Privilege Escalation Vulnerability
Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. Recently, we ...
China Cyberwar Coming? Versa’s Vice: Volt Typhoon’s Target
Richi Jennings | | CenturyLink, china, china espionage, China-linked Hackers, China-nexus cyber attacks, China-nexus cyber espionage, CVE-2024-39717, Lumen, Lumen Technologies, Peoples Republic of China, SB Blogwatch, Versa Director, Versa Neworks, VersaMem, Volt Typhoon
Xi whiz: Versa Networks criticized for swerving the blame ...
Security Boulevard
Oregon Zoo Data Breach Exposes Payment Card Information
The Oregon Zoo's recent data breach serves as a stark reminder of the urgent need for robust cybersecurity measures in today's digital landscape. With over 117,000 payment card details potentially compromised, this ...
Strengthening API Security with AppSentinels Integration in the Strobes Platform
Shubham Jha | | API security, appsentinels, integration, integrations, Product updates, strobes, Vulnerability Management
APIs are the backbone of apps and cloud services, making everything work seamlessly behind the scenes. But with their power comes a unique set of security challenges that can’t be... The post ...