Iranian Hackers Attack Telecom Companies Using Custom Tools and Living-Off-The-Land Techniques
The telecommunications companies in Egypt, Sudan, and Tanzania have been the target of the Iranian espionage group Seedworm, which is known as Muddywater. The attack took place in November 2023,…
Top 3 Cybersecurity Trends for SME Business Leaders in 2024
As Cynet’s COO, my team and I get to work closely with risk management executives at small-to-medium enterprises (SMEs) around the world. In this article, I’ll condense our collaboration’s insights…
Okta to Acquire Spera Security
In a landmark move, Okta, the leading Identity and Access Management (IAM) provider has announced its acquisition of Spera Security, a rising star in the Identity security space. Spera Security…
New Terrapin Attack Downgrades SSH Protocol Connection Security
SSH protocol is one of the most used protocols across several organizations to establish a remote terminal login and file transfer. SSH consists of an authenticated key exchange for establishing…
10 Most Notable Cyber Attacks of 2023
In recent times, due to rapid advancements in technology, increased connectivity, and sophisticated tactics that threat actors use, cyber attacks are evolving at a rapid pace. The rise of AI…
Kimsuky Group Using Weaponized LNK File to Deploy AppleSeed Malware
Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can be executed when the user clicks on the shortcut. These…
Yakult Confirms Cyber Attack: Over 95 GB of data Leaked on Dark Web
The biggest producer of probiotic drinks in the world, Yakult, was the target of a significant that exposed private data and corporate records on the dark web. The threat actor…
Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data
As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas – ‘Leaksmas,’ a season marked by rampant data dumps targeting individuals…
Top 10 Vulnerabilities That Were Exploited the Most In 2023
Several vulnerabilities have been identified and exploited by threat actors in the wild this year for several malicious purposes, such as Ransomware, cyber espionage, data theft, cyberterrorism, and many nation-state-sponsored…
GitHub Wants All Users to Enable 2FA Before the End of 2023
GitHub, the omnipresent nexus for developers and their code, has embarked on a decisive initiative aimed at fortifying the security of the software supply chain. In a groundbreaking announcement, the…