Sophos, a global leader in next-generation cybersecurity, has published new research, “Trash Panda as a Service: Raccoon Stealer Steals Cookies, Cryptocoins and More,” detailing how a stealer disguised as pirated software grabs cryptocurrencies and information while dropping malicious content, such as cryptominers, on targeted systems.Read More…

BeyondTrust, the worldwide leader in Privileged Access Management, has announced the release of BeyondTrust Password Safe 21.2 and BeyondInsight 21.2, with increased flexibility to manage privileged custom applications and previously unsupported systems. The new features and capabilities improve security and enable IT operations and security teams to intuitively manage privilegedRead More…

ESET researchers have discovered a set of 10 previously undocumented malware families, implemented as malicious extensions for Internet Information Services (IIS) web server software. Targeting both government mailboxes and e-commerce credit card transactions, as well as aiding in malware distribution, this diverse class of threats operates by eavesdropping on andRead More…

Ali Sleiman, Regional Technical Director, Middle East & Africa at Infoblox elaborates on the need for cybersecurity rollout from day one in a hybrid workforce. The hybrid workforce is a permanent reality for most companies these days. The sudden onset of the pandemic and associated shutdowns gave organizations very littleRead More…

With the impact of the COVID 19 pandemic, ‘remote working’ has been the “new normal” for all of us. With more people using personal devices for work, companies going through sudden digital transformation and moving data to the cloud, which has led to the increase in number of cyber-attacks sinceRead More…

SentinelOne, an autonomous cybersecurity platform company, unveiled SentinelOne Storyline Active Response (STAR), its cloud-based automated hunting, detection, and response engine. Integrated with SentinelOne’s ActiveEDR, STAR empowers security teams to create custom detection and response rules and deploy them in real time to the entire network or desired subset, to proactivelyRead More…

Check Point Research (CPR) found security flaws in Amazon Kindle, the world’s most popular e-reader. If exploited, the flaws would have enabled a threat actor to take full control over a user’s Kindle, resulting in the possible theft of Amazon device token, or other sensitive information stored on the device.Read More…