Cybersecurity
-
Clop ransomware targets Oracle E-Business Suite customers exploiting zero-day vulnerabilities
Source: CyberScoopRead more: Clop ransomware targets Oracle E-Business Suite customers exploiting zero-day vulnerabilitiesThe Clop ransomware group has been exploiting zero-day vulnerabilities in Oracle E-Business Suite since early August, stealing data from dozens…
-
ClayRat Android Spyware Campaign Targets Russian Users via Fake Popular Apps
Source: The Hacker NewsRead more: ClayRat Android Spyware Campaign Targets Russian Users via Fake Popular AppsThe ClayRat spyware campaign targets Android users in Russia by distributing malicious apps disguised as popular platforms such as WhatsApp,…
-
SonicWall Confirms Security Breach Affecting All Cloud Backup Customers
Source: BleepingComputerRead more: SonicWall Confirms Security Breach Affecting All Cloud Backup CustomersSonicWall has confirmed a security breach that impacted every customer using its cloud backup service. The breach involved the theft…
-
Debate sobre la cotización de robots en el contexto de la automatización y la inteligencia artificial
Source: CIO MagazineRead more: Debate sobre la cotización de robots en el contexto de la automatización y la inteligencia artificialEl artículo discute la propuesta de gravar a los robots o tecnologías de inteligencia artificial que sustituyen mano de obra…
-
Researchers Analyze PureRAT Attack Chain Escalating from Python Infostealer to Full Backdoor
Source: BleepingComputerRead more: Researchers Analyze PureRAT Attack Chain Escalating from Python Infostealer to Full BackdoorResearchers have mapped a cyberattack campaign that evolved from a Python-based infostealer to the deployment of the PureRAT full backdoor.…
-
SonicWall Reports Unauthorized Access to Cloud Backup Firewall Configurations
Source: The Hacker NewsRead more: SonicWall Reports Unauthorized Access to Cloud Backup Firewall ConfigurationsSonicWall disclosed a security incident where an unauthorized party accessed firewall configuration backup files stored in its cloud backup service.…
-
Applying Zero Trust Principles to Secure OT Networks in Critical Infrastructure
Source: ForresterRead more: Applying Zero Trust Principles to Secure OT Networks in Critical InfrastructurePhysical security in critical infrastructure is typically stringent, but operational technology (OT) networks often lack comparable digital security controls. The…
-
AI-Driven Cybersecurity Enhances Black Hat USA Network Operations Center Security
Source: CIO MagazineRead more: AI-Driven Cybersecurity Enhances Black Hat USA Network Operations Center SecurityAt Black Hat USA, Palo Alto Networks deployed its AI-driven Cortex XSIAM platform to secure the conference’s Network Operations Center.…
-
Marshall Erwin’s Cybersecurity Leadership Journey at Fastly
Source: Dark ReadingRead more: Marshall Erwin’s Cybersecurity Leadership Journey at FastlyMarshall Erwin discusses how leading through major cybersecurity incidents influenced his career progression from a CIA analyst to a US…
-
Salesforce Launches Agentforce IT Service with Agentic AI for ITSM
Source: CIO MagazineRead more: Salesforce Launches Agentforce IT Service with Agentic AI for ITSMSalesforce introduces Agentforce IT Service, an AI-driven IT service management suite that uses autonomous agents to handle incidents and service…






