Tuesday , January 7 2025

TimeLine Layout

May, 2024

  • 1 May

    Azure Logs utilizing to identify threats: Insights From Microsoft

    Azure

    Microsoft security experts recently conducted an exploration on how to effectively use Azure Logs to identify and counteract threat actions. Azure’s defense mechanism relies on effectively understanding and using logs to hunt for threats. Microsoft focuses on integrating best practices for log management, analysis, and incident response to stay proactive …

    Read More »

April, 2024

  • 30 April

    NCSC
    NEW UK LAW BANS DEFAULT PASSWORDS ON SMART DEVICES

    NCSC

    The UK’s NCSC wants smart device manufacturers to follow new law banning default passwords. The law, known as the Product Security and Telecommunications Infrastructure act (or PSTI act), will be effective on April 29, 2024. “From 29 April 2024, manufacturers of consumer ‘smart’ devices must comply with new UK law.” …

    Read More »
  • 30 April

    U.S. Releases New AI Security Guidelines for Critical Infrastructure

    Robot

    DHS with Cybersecurity and Infrastructure Security Agency (CISA) have released safety and security guidelines to address AI risks that affect the safety and security of critical infrastructure systems in the US. The guidelines analyze system-level risks in three main categories. Attacks Using AI: The use of AI to enhance, plan, …

    Read More »
  • 29 April

    Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

    hacker

    Earlier this week, EPCYBER has identified a large scale network of Chinese botnet as-a-service which consists of various domains, over 20 active telegram groups and other domestic communication channels using Chinese infrastructure. It is evident that the methods and botnet developed and used by the group, successfully bypasses latest DDoS …

    Read More »
  • 28 April

    Phoenix Summit 2024: Elevating Cyber security, Impact and Vision

    phonix

    This May, Dhaka, Bangladesh, will host Phoenix Summit 2024, a landmark event in the global cyber security arena. Set from May 23-25, this summit aims to inspire and empower both novices and seasoned enthusiasts in the cyber security field. Why Attend Phoenix Summit 2024? Phoenix Summit is crafted to deliver …

    Read More »
  • 27 April

    ALERT: SEKOIA REPORT
    PlugX Malware Plagues Over 90k IP Addresses over 170 countries

    USB

    The worm was first discovered in a 2023 post by security firm Sophos. It became active in 2019 when a variant of malware called PlugX added a feature to infect USB drives automatically. This allowed the malware to spread to new machines without needing any user interaction. Sekoia, a European …

    Read More »
  • 26 April

    Palo Alto network shared latest remediation of CVE-2024-3400

    palo alto

    Palo Alto Networks has given urgent advice to the remediation of a critical vulnerability, known as CVE-2024-3400, which attackers have used to get unauthorized access. The cybersecurity company has provided clear steps for organizations to reduce the risks of this breach and protect their networks from future attacks. Environment: Palo …

    Read More »
  • 26 April

    CISA Launches Ransomware Vulnerability Warning Pilot for Critical Infrastructure

    CISA

    Organizations across all sectors and of all sizes are too frequently impacted by damaging ransomware incidents. Many of these incidents are perpetrated by ransomware threat actors using known vulnerabilities. By urgently fixing these vulnerabilities, organizations can significantly reduce their likelihood of experiencing a ransomware event. In addition, organizations should implement …

    Read More »
  • 26 April

    WhatsApp warns India to exit, If…

    india

    According to the report by several Indian media, social media platform Meta will withdraw its entire service from India if it is forced to breaks encryption. This is what WhatsApp has claimed in the hearing of a case in the Delhi High Court. This was claimed by WhatsApp in the …

    Read More »
  • 26 April

    Fake e-mail of Rajshahi Univ VC’ name-picture, sending messages

    Someone is pretending to be Rajshahi University Vice-Chancellor, Professor Dr. Golam Sabbir Sattar, by creating a fake email account and sending fake messages to people he knows. The vice chancellor is aware of this and has asked everyone to be cautious. Professor Ghulam Sabbir Sattar warned about this on his …

    Read More »

This will close in 6 seconds