'

SEC: SIM Swapping Attack Led to Twitter Account Compromise

SEC: SIM Swapping Attack Led to Twitter Account Compromise

Two weeks after its Twitter account was compromised, the SEC has confirmed that the threat actors behind the hack were likely able to obtain control of the cell phone number associated with the SEC account through a SIM swapping attack. Attackers use SIM swapping to transfer phone numbers to another device without authorization, allowing them … Read more

Categories duo

Chinese cyberspies exploited critical VMware vCenter flaw undetected for 1.5 years

Chinese cyberspies exploited critical VMware vCenter flaw undetected for 1.5 years

In October, VMware fixed a critical remote code execution vulnerability in its vCenter Server (CVE-2023-34048) and Cloud Foundation enterprise products that are used to manage virtual machines across hybrid clouds. It has now come to light that a Chinese cyberespionage group had been exploiting the vulnerability for 1.5 years before the patch became available. “These … Read more

Cato Networks Introduces World’s First SASE-based XDR

Cato Networks Introduces World’s First SASE-based XDR

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world’s first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and … Read more

Cato Networks launches new SASE-powered XDR offering

Cato Networks launches new SASE-powered XDR offering

Cato Networks has announced an expansion of its secure access service edge (SASE) cloud platform to include a threat detection and incident response offering, Cato extended detection and response (XDR). Combining its existing SASE functionalities with a new endpoint protection platform (EPP) capability, Cato’s new XDR extension aims to overcome “deployment delays, limited data quality, … Read more

Public Sector Cyberattacks Rise By 40% in 2023

Public Sector Cyberattacks Rise By 40% in 2023

Cyber attacks against government agencies and public sector services increased by 40% in the second quarter of 2023 compared to the first, a new report by KnowBe4 has highlighted. The Cybercrime in the Public Sector report examines the most popular and prolific cybercrimes of 2023, including cybercrime trends, statistics and real life examples on a … Read more

10 top cyber recovery providers

10 top cyber recovery providers

Sophisticated and novel attacks have required new classes of security tools that are designed to detect and prevent emerging and evolving threats. This is why cyber recovery is becoming more prevalent. A cyber response differs from the known disaster response in that it detects an attack, isolates it, and analyses to then provision a recovery … Read more

Australian government names and issues sanctions on individual linked to Medibank data breach

Australian government names and issues sanctions on individual linked to Medibank data breach

The Australian federal government has revealed Russian citizen “and cybercriminal” Aleksandr Ermakov is linked to the Medibank Private data breach that saw PII and critical medical information of Australian citizens and international students leaked on the dark web. Department of Foreign Affairs and Trade In an Australian first, the government also imposed a targeted financial … Read more