Cybersecurity

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance​

The U.S. government on Tuesday announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for Internet-of-Things (IoT) consumer devices.
“IoT products can be susceptible to a range of security vulnerabilities,” the U.S. Federal Communications Commission (FCC) said. “Under this program, qualifying consumer smart products that meet robust cybersecurity standards will bear

FCC Launches ‘Cyber Trust Mark’ for IoT Devices to Certify Security Compliance​ Read Post »

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers​

Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data.
“Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers​ Read Post »

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption​

Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer.
“Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple’s XProtect,” Check Point Research said in a new analysis shared with The Hacker News. “This development allows it to

New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption​ Read Post »

Product Walkthrough: How Reco Discovers Shadow AI in SaaS​

As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has emerged in the world of AI: shadow AI. 
Shadow AI refers to the unauthorized use of AI tools and copilots at organizations. For example, a developer using ChatGPT to assist with writing code, a salesperson downloading an AI-powered meeting transcription tool, or a

Product Walkthrough: How Reco Discovers Shadow AI in SaaS​ Read Post »

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan​

Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for Cybersecurity (NCSC) accused a China-linked threat actor named MirrorFace of orchestrating a persistent attack campaign targeting organizations, businesses, and individuals in the country since 2019.
The primary objective of the attack campaign is to steal information related to Japan’s national

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan​ Read Post »

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions​

Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online lives secure, is now being weaponized by cybercriminals to hide malware, steal data, and avoid detection.The result? A 10.3% surge in encrypted attacks over the past year and some of the most shocking ransom payouts in history, including a $75 million ransom in 2024.
Are you prepared to fight back?
Join

Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions​ Read Post »

Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity​

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy medical devices to IoT sensors – onto their production networks.

Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity​ Read Post »

Scroll to Top