Skip to content

Cyber Security

High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian “Revealed: Startling Facts About [Topic]!”

This week, Cisco’s Talos threat intelligence and research unit unveiled two high-severity vulnerabilities present in WellinTech’s KingHistorian industrial data historian software. This software is used to collect and process data from industrial control systems (ICSs). One of these vulnerabilities, tracked as CVE-2022-45124, can allow an attacker to obtain the username and password of a legitimate… 

Backslash Snags $8M Seed Financing for AppSec Tech “Unlock the Secret to Lasting Weight Loss: Answers Here!”

The enterprise AppSec market is an increasingly lucrative space, and the emergence of Backslash Security from stealth on Wednesday with $8 million in seed-stage capital and new technology to identify and mitigate “toxic code flows” in cloud-native applications is set to shake things up. The Israeli startup was funded by StageOne Ventures, First Rays Venture… 

‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks “Unlock the Hidden Benefits of Investing in Mutual Funds!”

This week, cybersecurity company Black Lantern announced Badsecrets, an open source tool designed to help identify known or weak cryptographic secrets across various web frameworks. The library is written in Python and has a modular design, offering ten modules meant to replace existing tools for finding secrets. Badsecrets is inspired by Blacklist3r, a project from… 

How Companion Viruses Work And How To Protect Your System

How Companion Viruses Work And How To Protect Your System The prevalence of cyber attacks has been increasing steadily in recent years, making it more important than ever to protect your system from malicious threats. One such threat is the companion virus – a type of malware that can wreak havoc on digital systems and… 

Companion Viruses: What You Need To Know To Keep Your Computer Safe

Companion Viruses: What You Need To Know To Keep Your Computer Safe Viruses have been a scourge of computers since the dawn of their inception. Companion viruses are one such type, and they require special attention to ensure that your computer is safe from infection. This article will provide an overview of companion viruses, detailing… 

Researchers Reveal New Malware Distribution Techniques

Researchers Reveal New Malware Distribution Techniques Mar 22, 2023 – Cyber Threat Intelligence: The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to download additional malware, according to multiple reports from AhnLab Security Emergency response Center (ASEC), SEKOIA.IO, and Zscaler. ScarCruft is also known as… 

Preventing Insider Threats in Your Active Directory

Preventing Insider Threats in Your Active Directory Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. In order to protect against insider threats and secure AD, organizations must take an in-depth look into existing permission structures, active users, and the technical implementation of Active Directory. Training users to identify potential… 

Spain Needs More Transparency Over Pegasus: EU Lawmakers

Spain Needs More Transparency Over Pegasus: EU Lawmakers The European Parliament is Calling for More Transparency in Spain’s Pegasus Spyware Hacking Scandal On Tuesday, the European Parliament’s cross-party committee concluded a two-day fact-finding mission to Madrid to investigate the illegal use of spyware in EU states, specifically the Pegasus software which can turn smartphones into… 

Google Suspends Chinese Shopping App Amid Security Concerns

Google Suspends Chinese Shopping App Amid Security Concerns Google has taken swift action to suspend the Chinese shopping app, Pinduoduo, from the Google Play store due to security concerns. Reports suggest that the app could potentially be used to spy on users in the United States, adding to the already high tensions between the two… 

Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products

Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products Organizations using Aveva’s HMI and SCADA products have recently been informed of the existence of several potentially serious vulnerabilities. Last week, Aveva and CISA published security advisories in regards to three vulnerabilities in the InTouch Access Anywhere HMI and Plant SCADA Access Anywhere products.…