Endace Establishes Middle East Regional Headquarters in Saudi Arabia

November 21, 2024 at 05:50PM Endace announces the establishment of Endace Arabia LLC in Riyadh, Saudi Arabia, to enhance its presence in the Middle East. This move supports local cybersecurity efforts, utilizing Endace’s packet capture technology. The company aims to address growing demand for robust cyber defense in critical infrastructure across the region. ### Meeting … Read more

Defending OT Requires Agility, Proactive Controls

July 17, 2024 at 04:35AM Hackers with ties to the Chinese government have gained access to US critical infrastructure, transitioning from espionage to potentially compromising or destroying infrastructure via operational technology. Recent attacks on maritime and water systems signal the need for increased OT security. Three key steps include converging IT and OT security, developing … Read more

LockBit ransomware returns to attacks with new encryptors, servers

February 28, 2024 at 01:31PM The LockBit ransomware gang faced a disruption by law enforcement last week but has quickly resumed attacks with updated encryption and a new data leak site. They retaliated against the agencies involved, claiming to strengthen their security measures. LockBit is recruiting experienced pentesters, indicating a potential increase in future attacks. … Read more

Feds Confirm Remote Killing of Volt Typhoon’s SOHO Botnet

February 1, 2024 at 04:54PM US law enforcement disrupted the China-sponsored cyberattack group Volt Typhoon, known for managing a botnet to launch attacks on US critical infrastructure. The FBI used a kill switch to delete the malware from routers and sever their connection to the botnet. However, experts believe the group will rebuild, but US … Read more

CISA Sets a Deadline – Patch Juniper Junos OS Flaws Before November 17

November 14, 2023 at 01:33AM The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has set a November 17 deadline for federal agencies and organizations to address security flaws in Juniper Junos OS. CISA added five vulnerabilities to the Known Exploited Vulnerabilities catalog, with potential for remote code execution. CISA also warned about the Royal ransomware … Read more

What to do with a cloud intrusion toolkit in 2023? Slap a chat assistant on it, duh

November 9, 2023 at 02:08AM A cybersecurity tool called Predator AI has been discovered by infosec researchers. It can be used to compromise poorly secured cloud services and web apps, and also includes a partially functional chat-bot assistant. While it is supposedly intended for educational purposes, it has the potential to be used maliciously. The … Read more

Gaza Conflict: How Israeli Cybersecurity Will Respond

October 11, 2023 at 02:06PM Israeli cybersecurity companies are expected to play a crucial role in the war effort against Hamas, given their expertise and capabilities. As the Gaza crisis intensifies, hacktivists have already launched cyberattacks, including DDoS attacks, with experts predicting more sophisticated attacks targeting infrastructure, civilians, and military targets. The Israeli military has … Read more