Skip to content
information security Page 134

information security

Implementing Zero Trust Controls for Compliance

Implementing Zero Trust Controls for Compliance

The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network… 

U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

Mar 22, 2024NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of illegally maintaining a monopoly over smartphones, thereby undermining, among others,… 

Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

Mar 22, 2024NewsroomLinux / Cyber Warfare The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new findings from SentinelOne show. The cybersecurity firm also confirmed connections… 

Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems

Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems

Mar 21, 2024NewsroomThreat Intelligence / Malware The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO) in order to deploy a backdoor called TinyTurla-NG. “The attackers compromised… 

Over 800 npm Packages Found with Discrepancies, 18 Exploitable to ‘Manifest Confusion’

Over 800 npm Packages Found with Discrepancies, 18 Exploitable to ‘Manifest Confusion’

Mar 21, 2024NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which have discrepancies from their registry entries, out of which 18 have been found to exploit a… 

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

Mar 21, 2024NewsroomThreat Intelligence / Vulnerability Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that’s used to target Laravel applications and steal sensitive data. “It works by scanning and taking out… 

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

In today’s digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions. As more vendors and services are added to the mix, the complexity and… 

GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws

GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws

Mar 21, 2024NewsroomMachine Learning / Software Security GitHub on Wednesday announced that it’s making available a feature called code scanning autofix in public beta for all Advanced Security customers to provide targeted recommendations in an… 

U.S. Sanctions Russians Behind ‘Doppelganger’ Cyber Influence Campaign

U.S. Sanctions Russians Behind ‘Doppelganger’ Cyber Influence Campaign

Mar 21, 2024NewsroomNational Security / Data Privacy The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sanctions against two 46-year-old Russian nationals and the respective companies they own for engaging in…