Cyber Security Archives - Page 14 of 29 - Exotic Digital Access
  • Kangundo Road, Nairobi, Kenya
  • support@exoticdigitalaccess.co.ke
  • Opening Time : 07 AM - 10 PM
Mozi Botnet Likely Killed by Its Creators

Mozi Botnet Likely Killed by Its Creators

The recent shutdown of the Mozi botnet is believed to be the work of its operators, who may have been forced to kill their creation by Chinese authorities. This is a theory from cybersecurity firm ESET, whose researchers recently discovered a kill switch suggesting that the takedown was deliberate.  Mozi emerged in September 2019 and […]

Read More
Budget Cuts at CISA Could Affect Enterprise Cybersecurity

Budget Cuts at CISA Could Affect Enterprise Cybersecurity

The US Cybersecurity and Infrastructure Security Agency’s efforts to combat disinformation about US elections and election infrastructure — a tiny part of its overall mission — may lead to budget cuts that affect CISA’s two principal responsibilities: defending federal networks and aiding critical infrastructure operators against cyberattackers. Last month, half of House Republicans voted for […]

Read More
Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe

Roundcube zero-day exploited in attacks on European governments – Week in security with Tony Anscombe

Video The zero-day exploit deployed by the Winter Vivern APT group only requires that the target views a specially crafted message in a web browser 27 Oct 2023 This week, ESET research described how the Winter Vivern APT group has been exploiting a zero-day XSS vulnerability in Roundcube Webmail servers to target European governmental entities […]

Read More
Digi International updates SkyCloud features for industrial monitoring and control solutions

Bitdefender Offensive Services incorporates penetration testing and red team simulated attacks

Bitdefender announced Bitdefender Offensive Services, a new offering designed to proactively assess, identify, and remediate security gaps in an organization’s environment (on premises, cloud, hybrid) through penetration testing and red team simulated attacks. In an independent global survey of 400 IT and cybersecurity professionals, 52% of businesses surveyed suffered a data leak or breach in […]

Read More
Sophos Endpoint continues to be recognized by analysts, independent testers and customers – Sophos News

Sophos Endpoint continues to be recognized by analysts, independent testers and customers – Sophos News

Sophos Intercept X Endpoint delivers unparalleled protection against advanced attacks, employing extensive, sophisticated technologies to stop the broadest range of threats before they can impact an organization. Powerful EDR and XDR tools enable defenders to hunt for, investigate, and respond to suspicious activity and indicators of attack. Against the backdrop of a host of exciting […]

Read More
Biden Picks New NSA head, Key to Support of Ukraine, Defense of US Elections

Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected

The iOS zero-click attacks that targeted the iPhones of dozens of Kaspersky senior employees earlier this year focused heavily on exercising stealth, the Russian cybersecurity vendor says. Referred to as ‘Operation Triangulation’, the attacks involved malicious iMessage attachments designed to exploit a remote code execution (RCE) zero-day and deploy a spyware implant dubbed TriangleDB. Apple […]

Read More
Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps

Lazarus Group Targeting Defense Experts with Fake Interviews via Trojanized VNC Apps

Oct 18, 2023NewsroomCyber Attack / Malware The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network Computing (VNC) apps as lures to target the defense industry and nuclear engineers as part of a long-running campaign known as Operation Dream Job. “The threat actor tricks job seekers […]

Read More
10 tips to build an effective business backup strategy

10 tips to build an effective business backup strategy

Business Security How robust backup practices can help drive resilience and improve cyber-hygiene in your company 18 Oct 2023  •  , 5 min. read Could your company survive if its most critical data stores were suddenly encrypted or wiped out by cybercriminals? This is the worst-case scenario many organizations have been plunged into as a […]

Read More