Shift Left Exhaustion – Part 2: Smart Shift Left
Introduction In my previous blog post, we discussed the state of the union for shift left and and how many organizations are not implementing correctly. So what now? We need to understand the are signs of doing shift left incorrectly and learn how to take a different approach. Recognizing the consequences of a poor shift […]
The not-so-secure dark web drug marketplace • Graham Cluley
Well, here’s a shocker. Incognito Market, a darknet platform connecting sellers of narcotics to potential buyers, has turned out to be not entirely trustworthy. Drug vendors and buyers alike are being extorted. They are being threatened that their supposedly secure (and in some cases supposedly deleted) private chats will be made public unless they give […]
Hackers exploit Windows SmartScreen flaw to drop DarkGate malware
A new wave of attacks by the DarkGate malware operation exploits a now-fixed Windows Defender SmartScreen vulnerability to bypass security checks and automatically install fake software installers. SmartScreen is a Windows security feature that displays a warning when users attempt to run unrecognized or suspicious files downloaded from the internet. The flaw tracked as CVE-2024-21412 […]
DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack
Mar 14, 2024NewsroomMalware / Cyber Attack A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw in Microsoft Windows as a zero-day using bogus software installers. “During this campaign, users were lured using PDFs that contained Google DoubleClick Digital Marketing (DDM) open redirects that led unsuspecting victims to compromised sites hosting […]
150K+ UAE Network Devices & Apps Exposed Online
The rapid adoption of IT and operational technology (OT) by the United Arab Emirates (UAE) has dramatically increased its attack surface, with nearly 155,000 recently discovered remotely accessible assets left vulnerable due to misconfigurations and insecure applications. The vulnerable assets include remote access points, network administration interfaces, insecure network devices, and open file sharing systems, […]
Take a Cisco Store Tech Lab Tour
If you’ve ever wanted to learn more about what the Cisco Store Tech Lab looks like on the road, here’s your chance! The Cisco Store team opened a travel store at Cisco Live EMEA, held in Amsterdam from February 5-9, 2024. First, some numbers Around 7,100 visitors came through the Cisco Store, and 396 attendees […]
Stuck streaming sticks, TikTok conspiracies, and spying cars • Graham Cluley
Roku users are revolting after their TVs are bricked by the company, we learn how to make money through conspiracy videos on TikTok, and just how much is your car snooping on your driving? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham […]