Fortinet Fixes RCE Flaws in FortiOS and FortiProxy

Specifically-made packages allow hackers to execute arbitrary code without authentication

Fortinet, a well-known vendor of corporate-grade security solutions, issued an urgent patch that fixes critical vulnerabilities in two products. FortiOS and FortiProxy SSL-VPN were reportedly vulnerable to remote code execution vulnerabilities – it is common to see them graded with CVSS 8-9/10. What is Fortinet and its products? Fortinet is a developer of a very… Continue reading Fortinet Fixes RCE Flaws in FortiOS and FortiProxy

Third Party Data Breach: Definition and How to Prevent It

Data breaches by third parties are a concerning issue for today’s organizations.

In today’s digital landscape, data breaches have become an alarming reality for organizations and individuals. The increasing reliance on technology and the widespread collection, storage, and exchange of personal information have created opportunities for cybercriminals to exploit vulnerabilities. Among the various types of data breaches, third party data breach has emerged as a particularly concerning… Continue reading Third Party Data Breach: Definition and How to Prevent It

Android Malware Mimics VPN, Netflix and Over 60k of Other Apps

Malicious apps on Android use the guise of utilities and popular programs

Android is an open operating system. This is an advantage and a disadvantage. Cybersecurity technology experts recently discovered a widespread Android malware campaign. And given the scale of this campaign, it looks likely that it has been fully automated. A few words about Android malware As we know, the Android operating system is based on… Continue reading Android Malware Mimics VPN, Netflix and Over 60k of Other Apps

BlackCat Ransomware New Update Boosts Exfiltration Speed

The authors of the BlackCat ransomware have come up with an improved, faster, and more stealthy version to bypass security barriers.

BlackCat ransomware continues to make a fuss globally for the second year now, targeting various sectors. Most of the time, it goes to healthcare, government, education, manufacturing, and hospitality. The group constantly improves operations, automating data exfiltration and releasing new ransomware versions with upgraded capabilities. What is BlackCat Ransomware? The cybercriminals use ALPHV (BlackCat), a… Continue reading BlackCat Ransomware New Update Boosts Exfiltration Speed

What is “Windows Key Code Is Not Valid And Seems Pirated”?

Scammers bait users to contact them by phone, showing them a scary banner

Windows Key Code Is Not Valid And Seems Pirated appears to be a new scary scam approach used to trick Windows users. Banners with this prompt may appear out of nowhere, and can really scare inexperienced users. Let me explain to you what’s the matter with this banner, if you really have any issues, and… Continue reading What is “Windows Key Code Is Not Valid And Seems Pirated”?

How to Defeat Insider Threat?

Insider threat is a commonly underestimated danger which can deal a lot of damage to your company

In the current digital world, organizations face more risks than ever due to fast-paced technological changes. However, while external cyber threats such as hackers and malware often dominate the headlines, there is a lurking danger that often goes unnoticed and is underestimated – the insider threat. Insider Threat Definition An insider threat refers to harmful… Continue reading How to Defeat Insider Threat?

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Scammers massively use ChatGPT to create convincing phishing emails

Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level equations and even write a novel. But like in any other sphere, cybercriminals here have found some profit. With ChatGPT, they can deceive a user correctly and skillfully and thus steal his data. The key… Continue reading ChatGPT has become a New tool for Cybercriminals in Social Engineering

Conti Ransomware Heritage in 2023 – What is Left?

One wrong action can ruin a name forever, no matter how powerful it may be

Ransomware groups come and go, but the people behind them continue to use their hacking and extortion skills in new operations. For example, former members of the now-defunct Russian-language ransomware group Conti continue to conduct their dirty business under many other “sub-brands”. Conti Ransomware in a nutshell Conti ransomware, led by Russia-based threat actors, appeared… Continue reading Conti Ransomware Heritage in 2023 – What is Left?