Breaking into users’ devices via malicious applications is one of the common tactics used by malware authors. Recently, security experts from Pradeo uncovered a malicious mobile app available for download on Google Play, which was installed by more than...
While organizations and security admins worldwide are immersed in mitigating the Log4j vulnerability effects, new exploits are being weaponized to entice more fear. Recently, security experts from AdvIntel revealed that Conti ransomware operators abused the Log4j flaw (CVE-2021-44228) to...
Facebook, based on months of investigation, has banned seven cyber entities from their platform for manipulating and engaging in surveillance activity.
Facebook revealed that the surveillance services were indiscriminately targeting human rights activists, critics of authoritarian regimes, journalists, opposition parties,...
Security experts identified a new cyber espionage from the Chinese state-sponsored Advanced Persistent Threat (APT) group “Tropic Trooper” targeting transportation, health care, and government sectors across Hong Kong, the Philippines, and Taiwan. Also known as Earth Centaur and KeyBoy,...
Digitization is growing at a very fast pace, which is touching every aspect of our lives. To truly apprehend the role of AI/ML in cybersecurity, we need to understand how cyber technology and its usage has evolved.
By Shankar Karthikason,...
Log4j has been tagged by security vendor Tenable as the "single biggest, most critical vulnerability of the last decade." MITRE rated the vulnerability as critical and assigned a CVSS score of 10/10. News about the Log4j zero-day vulnerability (CVE-2021-44228,...
Log4j or Log4Shell, a critical vulnerability in the widely used Apache Log4j Library, has raised alarms and security concerns across the tech and info security communities.
By Rudra Srinivas, Sr. Feature Writer, and Minu Sirsalewala, Editorial Consultant, CISO MAG
The Log4j...
Digital identity plays an essential role in the information security architecture of every organization. It is an online or networked identity accepted by the organization's security layout for data and devices access. The aim of implementing digital identity is...
As 2022 peeks from the corner, there is anticipation that the year will, maybe, witness better security management to address the continued sophistication of cyberattacks, as witnessed in 2021.
The banking and finance industry, health care, critical infrastructure, and government...
Cyberthreats continue to target organizations in critical infrastructure sectors, causing severe damage to everyday routines. North American propane supplier Superior Plus is the latest victim to join the bandwagon of ransomware attacks.
In an official release, Superior Plus confirmed that...