Widely used Justice AV Solutions Viewer courtroom recording software has been subjected to a supply chain attack involving the deployment of a backdoor that enabled total system takeover, according to The Record, a news site by cybersecurity firm...
Novel ShrinkLocker ransomware exploits Microsoft BitLocker
Organizations in the steel and vaccine manufacturing sectors, as well as a government entity in Mexico, Jordan, and Indonesia have been subjected to attacks with the novel ShrinkLocker ransomware strain that exploits Microsoft BitLocker for file...
Ongoing Chinese cyberespionage operation targets government orgs
Chinese advanced persistent threat operation TGR-STA-0043, previously tracked as CL-STA-0043, has targeted at least seven government organizations across Asia, Africa, and the Middle East as part of the Operation Diplomatic Specter cyberespionage...
Cyberespionage schemes leveraged in escalating Moroccan gift card theft campaign
Moroccan hacking operation Storm-0539, also known as Ant Lion, has ramped up its gift card theft activities with cyberespionage tactics ahead of the Memorial Day holiday, according to BleepingComputer.
Much like an airplane's dashboard, configurations are the way we control cloud applications and SaaS tools. It's also the entry point for too many security threats. Here are some ideas for making the configuration process more secure.