Tag CrowdStrike

FireEye Hacked: Red-Team Penetration Testing Tools Compromised

On Tuesday, cybersecurity giant FireEye confirmed it has suffered a significant breach, falling victim to a sophisticated state-sponsored attack that resulted in the theft of its Red Team penetration testing tools. These tools are integral for evaluating the security measures of their clients, spotlighting the pressing vulnerabilities that organizations face,…

Read MoreFireEye Hacked: Red-Team Penetration Testing Tools Compromised

Pentera’s 2024 Report Uncovers Hundreds of Weekly Security Events, Emphasizing the Importance of Continuous Validation

markdown Cybersecurity Breaches Continue to Rise Despite Increased Protections In an alarming trend, recent findings indicate that over 51% of organizations have fallen victim to cyberattacks in the past two years. Despite deploying an average of 53 distinct security solutions, the effectiveness of these measures remains questionable. These insights are…

Read MorePentera’s 2024 Report Uncovers Hundreds of Weekly Security Events, Emphasizing the Importance of Continuous Validation

Researchers Identify New Infrastructure Deployed by SolarWinds Hackers

The SolarWinds cyberattack, which unfolded last December, has been recognized for its intricate methods of penetrating and maintaining a presence within targeted systems. Microsoft has characterized the involved threat actors as “skillful and methodic operators” committed to employing operational security best practices to evade detection. Recent research has uncovered evidence…

Read MoreResearchers Identify New Infrastructure Deployed by SolarWinds Hackers

Apple Issues Essential iOS and iPadOS Updates to Address VoiceOver Password Security Flaw

Apple Releases Critical Security Updates Addressing Password Vulnerabilities and Audio Privacy Issues Apple has recently issued important updates for iOS and iPadOS targeting two significant security vulnerabilities. One of these flaws has the potential to expose users’ saved passwords via the VoiceOver assistive technology, raising alarm among cybersecurity experts. The…

Read MoreApple Issues Essential iOS and iPadOS Updates to Address VoiceOver Password Security Flaw

SolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

In a recent development reflecting the persistent threat posed by Russian cyber actors, Microsoft has disclosed that the hackers behind the SolarWinds breach have resumed operations utilizing password spraying and brute-force methods to compromise customer accounts. This resurgence serves as a stark reminder that the attackers remain active and adept…

Read MoreSolarWinds Hackers Compromise Microsoft Customer Support to Target Clients

NSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

A persistent brute-force attack campaign, believed to be orchestrated by Russian military intelligence, has targeted enterprise cloud environments since mid-2019. This information is detailed in a joint advisory released by intelligence agencies in both the United States and the United Kingdom. The National Security Agency (NSA), Cybersecurity and Infrastructure Security…

Read MoreNSA and FBI Expose Hacking Techniques Employed by Russian Military Hackers

Musk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

In a significant cybersecurity incident, the University of Pennsylvania has fallen victim to a data breach that has raised alarms within its community. Following the breach, a hacker disseminated an email to numerous recipients, claiming responsibility while disparaging the institution. The email’s provocative subject line, “We got hacked (Action Required),”…

Read MoreMusk and Trump: Both Penn Alumni Targeted by a Supportive Hacker

LightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Telecom Sector Under Siege by LightBasin Recent investigations into cyber threats have revealed that an advanced adversary known as LightBasin is behind a series of attacks targeting the telecommunications industry. This sophisticated group is primarily focused on extracting highly specific data, such as subscriber information and call metadata, which aligns…

Read MoreLightBasin Hackers Compromise Over 13 Telecom Service Providers Since 2019

Oracle Alerts Users to Active Exploitation of Agile PLM Vulnerability

Oracle has issued a warning regarding a critical security vulnerability in its Agile Product Lifecycle Management (PLM) Framework, which has been actively exploited in real-world scenarios. The flaw, designated as CVE-2024-21287, boasts a CVSS score of 7.5, indicating its severity and potential impact. This vulnerability is particularly concerning because it…

Read MoreOracle Alerts Users to Active Exploitation of Agile PLM Vulnerability