Trend Micro, a world-renowned leader in cybersecurity, has achieved remarkable results in the recent ATT&CK® Evaluation conducted by MITRE Engenuity. Outperforming over 20 other vendors, Trend Micro secured the top position in the protection scenario. Using the cutting-edge Trend Vision One™ platform, we were able to swiftly identify and prevent …
Read More »Donald Trump Dead, Tweets Trump Jr’s Hacked Twitter(X) Account
Donald Trump Jr.’s account on X (formerly known as Twitter) was hacked after it started sharing strange and erratic posts, according to a spokesperson for former President Donald Trump. Andrew Surabian posted on X stating that Don’s account had been hacked. He further clarified that the recent post asserting the …
Read More »Cisco and F5 Join Forces to Deliver Secure, Multisite Load Balancing
Cisco and F5 have expanded their partnership with a new technology that helps businesses distribute heavy traffic across multiple locations, ensuring that services are always available and improving the performance of applications. The companies have joined forces, incorporating Cisco’s ACI Multi-Site/Multi-Pod package with F5’s Big IP DNS software. This helps …
Read More »Hackers to attack Telecoms Servers With HTTPSnoop Malware
The telecom industry emerged as a prime target for advanced adversaries and state-sponsored actors in 2022, resulting in a significant increase in Talos IR cases focused on this sector. Telecommunications companies possessing crucial infrastructure assets are particularly attractive targets due to their pivotal role in national networks, making them potential …
Read More »Microsoft accidently leaks 38TB of internal data and fixed the mistake
Microsoft’s AI research division accidentally leaked large amounts of sensitive data. This happened when they were contributing open-source AI learning models to a public GitHub repository. Cloud security firm Wiz recently discovered that a Microsoft employee mistakenly shared a URL. This URL led to a misconfigured Azure Blob storage bucket …
Read More »Unmasking Million-Dollar Crypto romance scam by Sophos
Cybersecurity firm Sophos has uncovered a pig-butchering ring that managed to steal over $1 million from its victims in just three months. Translated from Chinese as “shā zhū pán,” this intriguing term describes a captivating blend of romance and fraud, skillfully coaxing victims into investing in deceptive cryptocurrency ventures. An …
Read More »Oracle database services are coming to Microsoft Azure
Oracle Corp and Microsoft Corp have partnered to create Oracle Database@Azure. This new service allows customers to directly access Oracle database services that are hosted on Oracle Cloud Infrastructure (OCI) and deployed in Microsoft Azure datacenters. Oracle Database@Azure provides the performance, scalability, and availability advantages of Oracle Database on OCI …
Read More »Starlink soon launch satellite broadband services in India
Elon Musk’s internet company Starlink is going to launch its services in India soon. The company is likely to get the license India. Starlink requires GMPCS (Global Mobile Personal Communication Satellite) service license to provide satellite broadband services in India. OneWeb and Jio Satellite Communications Limited have already obtained this …
Read More »5 areas where zero trust can’t protect your organization
Gartner predicts that over 50% of cyberattacks until 2026 will target vulnerable areas that are not covered or protected by the principles of zero trust. “Zero trust has two significant concerns that need to be addressed. There are various factors to consider, such as legacy technology and shadow IT, that …
Read More »Researcher awarded discovering a Two-Factor Authentication bypass in Facebook
Bassem Bazzoun, a security researcher awarded for $25,300 and ranked 2nd place on the conference Leaderboard for discovering a Two-Factor Authentication bypass in Facebook during Meta bug bounty Researchers conference in Seoul, South Korea, 2023. If you’re curious about the technical details of how he managed to bypass Facebook’s two-factor …
Read More »