Outpost24, a leading cybersecurity risk management platform, announced the acquisition of Sweepatic. Based in Leuven (BE), Sweepatic is an innovative external attack surface management (EASM) platform.
The government of Nova Scotia and the University of Rochester are the first organizations in North America to confirm data theft as a result of the exploitation of a new vulnerability affecting popular file transfer tool MOVEit.
The US Ninth Circuit Court of Appeals last week ruled that Enigma Software Group can pursue its long-standing complaint against rival security firm Malwarebytes for classifying its software as “potentially unwanted programs” or PUPs.
The key element is the option for European Economic Area (EEA) data storage. Paid customers will be able to specify certain data for meetings, webinars, and team chats to be stored within the EEA.
The U.S. aerospace industry has recently been targeted by an unidentified threat actor leveraging a newly discovered malware that researchers named PowerDrop. Its sophisticated evasion techniques include deception, encoding, and encryption. The company suggests conducting vulnerability scans on Windows systems and remaining vigilant for any unusual pinging activity.
VMware issued multiple security patches today to address critical and high-severity vulnerabilities in VMware Aria Operations for Networks, allowing attackers to gain remote execution or access sensitive information.
Passkeys are an alternative authentication method to passwords, allowing users to sign in to apps and websites with their fingerprint, with facial recognition, or with their device’s PIN or pattern.
Insikt Group researchers linked the campaign to APT38, a state-sponsored group in North Korea notorious for several high-profile attacks on cryptocurrency firms and other organizations.
The settlement with the Federal Trade Commission comes in response to charges that Microsoft’s Xbox gaming system illegally gathered and retained children’s personal information without alerting their parents or getting their approval.
Although the hackers did not directly release user data, the compromised admin panel credentials potentially grant access to a substantial amount of personal information and data centers.