Chinese Hackers Are Utilizing a New Linux Malware Variants for Espionage

Hackers have launched a fresh cyber espionage campaign using different versions of Linux malware. Among the malware variants deployed are a new PingPull edition and an unrecorded backdoor called ‘Sword2033.’ PingPull is classified as a Remote Access Trojan (RAT), and was previously identified by Unit 42 in espionage attacks conducted by the Chinese state-sponsored group […]
Chinese Hackers Are Utilizing a New Linux Malware Variants for Espionage
Hackers have launched a fresh cyber espionage campaign using different versions of Linux malware. Among the malware variants deployed are a new PingPull edition and an unrecorded backdoor called ‘Sword2033.’ PingPull is classified as a Remote Access Trojan (RAT), and was previously identified by Unit 42 in espionage attacks conducted by the Chinese state-sponsored group […]
Hackers’ Used A 3-Year-Old Vulnerability To Breach US Federal Agency

A vulnerability that was discovered three years ago has been exploited by various threat actors, including a nation-state group, to breach an unnamed federal agency in the United States. The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) recently disclosed the issue, revealing that the […]
Hackers’ Used A 3-Year-Old Vulnerability To Breach US Federal Agency
A vulnerability that was discovered three years ago has been exploited by various threat actors, including a nation-state group, to breach an unnamed federal agency in the United States. The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) recently disclosed the issue, revealing that the […]
Business And Brand Identity Theft

Business success has its good sides, and we cannot deny the ugly realities that accompany it. A successful business or person is at high risk of identity theft by imposters aware of the possibility of deceiving or misleading unsuspecting people for financial gains. According to PwC, in the last two years, about 51% of […]
Business And Brand Identity Theft
Business success has its good sides, and we cannot deny the ugly realities that accompany it. A successful business or person is at high risk of identity theft by imposters aware of the possibility of deceiving or misleading unsuspecting people for financial gains. According to PwC, in the last two years, about 51% of […]
Content Management Systems Security

Online websites have exponentially increased over the past few years because of the availability of user-friendly, low-tech, and increasingly affordable website creation tools. With just a few clicks, content management systems like WordPress can be used to develop and launch a website. Content Management Systems are used to create 43.6% of all web pages worldwide […]
Content Management Systems Security
Online websites have exponentially increased over the past few years because of the availability of user-friendly, low-tech, and increasingly affordable website creation tools. With just a few clicks, content management systems like WordPress can be used to develop and launch a website. Content Management Systems are used to create 43.6% of all web pages worldwide […]
The Use Of Access Management Software To Ensure Security Within A Business Operations

For many organisations, passwords are the only method of authentication and all that is for data security. However, when it comes to an organisation’s cybersecurity posture, enforcing stronger passwords with long combinations and special characters is just the beginning of keeping an organisation secure. Organisations handle large volumes of data daily from customers’ personal information, […]
The Use Of Access Management Software To Ensure Security Within A Business Operations
For many organisations, passwords are the only method of authentication and all that is for data security. However, when it comes to an organisation’s cybersecurity posture, enforcing stronger passwords with long combinations and special characters is just the beginning of keeping an organisation secure. Organisations handle large volumes of data daily from customers’ personal information, […]