Latest Cybersecurity News and Articles


Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

24 October 2024
Cisco on Wednesday said it has released updates to address an actively exploited security flaw in its Adaptive Security Appliance (ASA) that could lead to a denial-of-service (DoS) condition. The vulnerability, tracked as CVE-2024-20481 (CVSS score: 5.8), affects the Remote Access VPN (RAVPN) service of Cisco ASA and Cisco Firepower Threat Defense (FTD) Software. Arising due to resource

72% of European organizations are using AI in the workplace

24 October 2024
According to a recent report, 53% of European organizations are confident employees are not properly utilizing generative AI.

67% of organizations say employees lack basic security awareness

24 October 2024
67% of organizations are concerned that employees lack fundamental security awareness. 

Why Phishing-Resistant MFA Is No Longer Optional: The Hidden Risks of Legacy MFA

24 October 2024
Sometimes, it turns out that the answers we struggled so hard to find were sitting right in front of us for so long that we somehow overlooked them. When the Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the FBI, issues a cybersecurity warning and prescribes specific action, it’s a pretty good idea to at least read the

Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

24 October 2024
The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google Chrome to seize control of infected devices. Cybersecurity vendor Kaspersky said it discovered a novel attack chain in May 2024 that targeted the personal computer of an unnamed Russian national with the Manuscrypt backdoor. This entails triggering the

Exploitation of vulnerability affecting Fortinet FortiManager

24 October 2024
The NCSC is encouraging UK organisations to take immediate action to mitigate a vulnerability affecting Fortinet FortiManager (CVE-2024-47575) and to follow the latest vendor advice.

Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

24 October 2024
Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation in the wild. Tracked as CVE-2024-47575 (CVSS score: 9.8), the vulnerability is also known as FortiJump and is rooted in the FortiGate to FortiManager (FGFM) protocol. "A missing authentication for critical function vulnerability [CWE-306] in FortiManager fgfmd daemon may

New macOS vulnerability allows unauthorized data access

24 October 2024
A new macOS vulnerability could allow a malicious actor to evade an operating system’s Transparency, Consent, and Control (TCC) technology. 

New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

23 October 2024
New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that the malicious software is continuing to be actively developed despite law enforcement efforts to crack down on the operation. "Only part of this gang was arrested: the remaining operators behind Grandoreiro continue attacking users all over the

4 organizations charged with misleading cyber disclosures

23 October 2024
The SEC has charged four public companies with misleading disclosures about cyber risks and intrusions.

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

23 October 2024
In episode 25 of the Cybersecurity & Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.

Permiso State of Identity Security 2024: A Shake-up in Identity Security Is Looming Large

23 October 2024
Identity security is front, and center given all the recent breaches that include Microsoft, Okta, Cloudflare and Snowflake to name a few. Organizations are starting to realize that a shake-up is needed in terms of the way we approach identity security both from a strategic but also a technology vantage point.  Identity security is more than just provisioning access  The conventional view

CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

23 October 2024
A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-38094 (CVSS score: 7.2), has been described as a deserialization vulnerability impacting SharePoint that could result

CISOs respond: 49% of CISOs plan to leave role without industry action

23 October 2024
A survey shows that nearly half (49%) of CISOs do not believe there is a future for them in this role. CISOs are sharing their insights on this statistic. 

The Global Surveillance Free-for-All in Mobile Ad Data

23 October 2024
Not long ago, the ability to remotely track someone’s daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a new lawsuit in a likely constitutional battle over a New Jersey privacy law shows that anyone can now access this capability, thanks to a proliferation of commercial services that hoover up the digital exhaust emitted by widely-used mobile apps and websites.

Researchers Reveal 'Deceptive Delight' Method to Jailbreak AI Models

23 October 2024
Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit 42, which described it as both simple and effective, achieving an average

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

23 October 2024
It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no wonder—the recent AppOmni 2024 State of SaaS Security Report reveals that only 15% of organizations centralize SaaS security within their cybersecurity teams. These statistics not only highlight a critical security blind spot,

Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks

23 October 2024
Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. "Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware," Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. "However, such is

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

22 October 2024
Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. "The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim's intervention to trigger the

Iranian cyber actors are targeting critical infrastructure entities

22 October 2024
Iranian cyber actors are targeting critical infrastructure entities via brute force.