A newly identified malware, IOCONTROL, is causing widespread alarm as it targets critical infrastructure in Israel and the United States. Developed by Iranian hackers, IOCONTROL is specifically designed to attack Internet of Things (IoT) devices and operational technology (OT)…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Citrix Expands Platform Capabilities with DeviceTrust and Strong Network Acquisitions
< p style=”text-align: justify;”>Citrix, a business unit of Cloud Software Group, has acquired DeviceTrust and Strong Network to enhance the functionality of its platform. These acquisitions enable Citrix to offer more comprehensive access management and security solutions, expanding its…
Critical Security Flaw in “Hunk Companion” Plugin Exploited by Hackers
Hackers are actively exploiting a serious security vulnerability in the “Hunk Companion” plugin to install and activate other plugins that contain known vulnerabilities from the WordPress.org repository. This targeted attack allows the installation of plugins with a variety of…
Critical Vulnerability Found in Cleo’s File-Sharing Tools: Immediate Action Required
< p style=”text-align: justify;”>A critical security vulnerability has been discovered in Cleo’s popular file-sharing tools, including Cleo Integration Cloud, Cleo Harmony, and Cleo VLTrader. This flaw puts businesses and users at significant risk of cyberattacks, prompting cybersecurity experts to…
MITRE’s Latest ATT&CK Evaluations Reveal Critical Insights into Cybersecurity Solutions
< p style=”text-align: justify;”>MITRE Corporation has published its findings from the latest round of ATT&CK evaluations, offering important insights into the effectiveness of enterprise cybersecurity solutions. This sixth evaluation assessed 19 vendors against two major ransomware strains, Cl0p and…
File-Sharing Tools Under Attack: What Users Need to Know
A serious flaw has been found in three widely used file-sharing tools, putting several organizations at risk of security breaches. The three tools affected, LexiCom, VLTransfer, and Harmony, are all developed by Cleo, a company focused on managed file…
Group-IB Unveils Sophisticated Phishing Campaign Targeting Global Organizations
A recent report by Group-IB has exposed a highly advanced phishing campaign targeting employees from 30 companies across 15 jurisdictions. Using trusted domains and cutting-edge personalization techniques, attackers have bypassed Secure Email Gateways (SEGs) and exploited victims in critical…
Active Exploitation of Cleo Communications’ File Transfer Software Exposes Critical Vulnerabilities
< p style=”text-align: justify;”>Cleo Communications’ file transfer software is under active attack, with security researchers from Huntress revealing that a recently issued patch fails to address the critical flaws being exploited. This ongoing vulnerability poses a significant threat to…
Is Bitcoin Vulnerable to Google’s Quantum Breakthrough?
Earlier this month, Google CEO Sundar Pichai announced the creation of their new quantum computing chips called “Willow“, which caused a few ripples in the Bitcoin investment community, but also caused some skepticism among Bitcoin skeptics due to the…
Data Breach at Datavant Exposes Thousands of Minors to Cyber Threats
< p style=”text-align: justify;”>While cybercriminals often target adults for their valuable financial and personal information, children are not exempt from these risks. This was made evident by a recent data breach involving health IT company Datavant, which exposed sensitive…