Zephyrnet Logo

Tag: Contentstack

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

As part of its ongoing invasion of Ukraine, Russian intelligence has once again enlisted the services of hacker group Nobelium/APT29, this time to spy...

Why xIoT Devices Are Cyberattackers’ Gateway Drug for Lateral Movement

Extended IoT devices (xIoT) stand as a perennial favorite for cyberattackers seeking to move laterally and establish persistence within enterprise networks. They've got everything...

Software-Dependency Data Delivers Security to Developers

Developers interested in gauging the security of open source components have an abundant number of choices, but they still have to choose to use...

Security Is a Revenue Booster, Not a Cost Center

Security has historically been seen as a cost center, which has led to it being given as little money as possible. Many CISOs, CSOs,...

Bugs in Manarium Play-to-Earn Platform Showcase Crypto-Gaming Insecurity

A proof-of-concept (PoC) hack of the Manarium play-to-earn (P2E) gaming platform allowed researchers to arbitrarily change their scores to win daily tournaments and collect...

New Mirai Variant Employs Uncommon Tactics to Distribute Malware

A new version of a Mirai variant called RapperBot is the latest example of malware using relatively uncommon or previously unknown infection vectors to...

Money Ransomware Group Enters Double-Extortion Fray

An emerging threat group dubbed Money Ransomware has adopted the increasingly popular tactic of encrypting and exfiltrating sensitive data from organizations and threatening to...

Lazarus Group’s ‘DeathNote’ Cluster Pivots to Defense Sector

An operation within North Korea's notorious Lazarus Group that initially focused solely on coin-mining attacks has begun targeting defense sector organizations around the world.The...

‘Blatantly Obvious’: Spyware Offered to Cyberattackers via PyPI Python Repository

Researchers have discovered malware peddlers advertising an info-stealer out in the open on the Python Package Index (PyPI) — the official, public repository for...

Where Are the Women? Making Cybersecurity More Inclusive

The cybersecurity threat continues to rage, and much has already been said about the need for concerted, coordinated, and cohesive steps to combat the...

How Password Managers Can Get Hacked

Over the past few months, several leading password managers have been victims of hacking and data breaches. For instance, LastPass, which experienced a massive...

How CIEM Can Improve Identity, Permissions Management for Multicloud Deployments

Did you know that 86% of businesses plan to increase their investment in hybrid or multicloud technology? And yet 73% of those same companies...

Latest Intelligence

spot_img
spot_img