Recent Security News
-
Black Friday 2023: Get 25% off the Zero2Automated malware analysis course
November 23, 2023 at 12:35PM The Zero2Automated malware analysis and reverse-engineering course is offering a Black Friday through Cyber Monday sale with a 25% discount sitewide, including gift certificates and courses. The course, started in May 2020 by Vitali Kremez and Daniel Bunce, provides over 25 hours of content and an online community with peers…
-
Which DevOps Skills are the Hardest to Learn?
November 23, 2023 at 10:48AM DevOps professionals face challenges in learning complex technologies and developing interpersonal skills. Networking in modern network architectures, writing software tests, mastering infrastructure as code, and understanding containerization and orchestration are some of the most difficult skills for DevOps practitioners. Additionally, soft skills like communication, empathy, and adaptability are crucial to…
-
Exploring Weaknesses in Private 5G Networks
November 23, 2023 at 10:48AM Private 5G networks are at risk due to a vulnerability in the GPRS Tunneling Protocol User Plane (GTP-U). The lack of encryption and authentication mechanisms in this critical link allows attackers to breach private 5G networks through packet reflection. To mitigate this risk, organizations should implement robust security protocols, firewalls,…
-
Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
November 23, 2023 at 10:06AM A new phishing attack carried out by a cyber espionage group called Konni has been observed. The attackers are using a Russian-language Microsoft Word document to deliver malware that can collect sensitive information from compromised Windows hosts. The group is known for targeting Russia and uses spear-phishing emails and malicious…
-
Industry piles in on North Korea for sustained rampage on software supply chains
November 23, 2023 at 08:44AM The UK and South Korea’s national cybersecurity organizations have issued a joint advisory warning about an increase in the volume and sophistication of North Korean software supply chain attacks. The advisory highlights the use of zero-day and N-day vulnerabilities and multiple exploits to achieve North Korea’s priorities, which include generating…