Cyber Security Archives - Page 13 of 27 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM
Cisco Plugs Gaping Hole in Emergency Responder Software

Cisco Plugs Gaping Hole in Emergency Responder Software

A remotely exploitable vulnerability in the Cisco Emergency Responder software could allow an unauthenticated attacker to log in to an affected device using the root account, according to a warning from the U.S. tech vendor. The vulnerability, tracked as CVE-2023-20101, carries a CVSS severity score of 9.8/10 and a “critical” tag from Cisco’s security response […]

Read More
Update on Naked Security – Sophos News

Update on Naked Security – Sophos News

Dear Naked Security readers, Firstly, thank you for your interest, your time, and your contributions to the Naked Security community. Your invaluable engagement and expertise have helped improve cybersecurity for everyone. We have recently added the extensive catalog of Naked Security articles to the Sophos News blog platform, enabling us to provide all Sophos security […]

Read More
CISO Accountability in a New Era of SEC Regulation

CISO Accountability in a New Era of SEC Regulation

Recent headlines have cast a spotlight on the evolving nature of cyber threats and their ripple effects across industries, accentuating the value of sensitive information in the modern threat landscape. The seismic SolarWinds attack, a supply-chain breach with widespread ramifications, underscores the transformation in hackers’ motivations — transitioning from a singular pursuit of financial gain to […]

Read More
New Advanced Backdoor with Distinctive Malware Tactics

New Advanced Backdoor with Distinctive Malware Tactics

Sep 23, 2023THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon as part of a cyber espionage campaign. “Deadglyph’s architecture is unusual as it consists of cooperating components – one a native x64 binary, the other a .NET assembly,” ESET […]

Read More
Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

Video Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups 22 Sep 2023 The lineup of speakers at this year’s edition of LABScon featured two ESET malware researchers who took to the stage to deconstruct sophisticated attacks conducted by two well-known APT groups. […]

Read More
Digi International updates SkyCloud features for industrial monitoring and control solutions

Viavi Observer Sentry provides threat visibility into AWS environments

Viavi Solutions unveiled Observer Sentry, Software-as-a-Service-based Threat Exposure Management providing SecOps, DevOps, and cloud architects much-needed threat visibility into ever-changing AWS environments. The 2023 State of the Network study from VIAVI revealed increases in enterprises’ dependence on the cloud, dissatisfaction with cloud visibility, and time spent on security issues. In an effort to continuously improve […]

Read More
China's ICS Cyber Onslaught Aimed at Gaining Kinetic Warfare Advantage

China’s ICS Cyber Onslaught Aimed at Gaining Kinetic Warfare Advantage

China’s onslaught of cyberattacks on critical infrastructure is likely a contingency move designed to gain a strategic advantage in the event of kinetic warfare, according to the US Department of Defense (DoD). The agency’s 2023 Cyber Strategy released this week flagged an uptick in state-sponsored cybercrime from the People’s Republic of China (PRC), specifically against […]

Read More
Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

Sep 14, 2023THNEndpoint Security / Vulnerability A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could be exploited by threat actors to run malicious code on vulnerable Linux and macOS systems. “Using environment variable poisoning, attackers could chain these vulnerabilities to elevate privileges and run […]

Read More
Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Ballistic Bobcat’s Sponsor backdoor – Week in security with Tony Anscombe

Video Ballistic Bobcat is a suspected Iran-aligned cyberespionage group that targets organizations in various industry verticals, as well as human rights activists and journalists, mainly in Israel, the Middle East, and the United States 14 Sep 2023 This week, ESET researchers unveiled their findings about a campaign by the Ballistic Bobcat APT group that deployed […]

Read More