Inside Iran’s Cyber Playbook: AI, Fake Hosting, and Psychological Warfare https://firewall.firm.in/wp-content/uploads/2024/11/iran-hackers.png U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer Olympics and compromising a French commercial dynamic display provider to show messages denouncing Israel’s participation in the sporting event. The activity has been pinned on an entity that’s known ...
Read More »Vulnerabilities & Exploits
Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar
Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar https://firewall.firm.in/wp-content/uploads/2024/11/webinar.png Nov 02, 2024The Hacker NewsSaaS Security / Identity Security Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in ...
Read More »North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack https://firewall.firm.in/wp-content/uploads/2024/10/paynow.png Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as ...
Read More »Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information
Opera Browser Fixes Big Security Hole That Could Have Exposed Your Information https://firewall.firm.in/wp-content/uploads/2024/10/attack.png Oct 30, 2024Ravie Lakshmanan Browser Security / Vulnerability A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access to private APIs. The attack, codenamed CrossBarking, could have made it possible to conduct actions such as capturing screenshots, ...
Read More »A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation
A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation https://firewall.firm.in/wp-content/uploads/2024/10/main.png Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.” Rather than following every ...
Read More »THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27)
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21 – Oct 27) https://firewall.firm.in/wp-content/uploads/2024/10/recap.png Oct 28, 2024Ravie LakshmananCyber Security / Hacking News Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you think the villains are locked up, a new threat emerges from the shadows. This week is no exception, with tales of exploited flaws, ...
Read More »New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors
New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors https://firewall.firm.in/wp-content/uploads/2024/10/intel.png Oct 29, 2024Ravie LakshmananHardware Security / Vulnerability More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible to speculative execution attacks. The attack, disclosed by ETH Zürich ...
Read More »Italian politicians express alarm at latest data breach allegedly affecting 800,000 citizens – ET CISO
Italian politicians express alarm at latest data breach allegedly affecting 800,000 citizens – ET CISO https://etimg.etb2bimg.com/thumb/msid-114715707,imgsize-112418,width-1200,height=765,overlay-etciso/data-breaches/italian-politicians-express-alarm-at-latest-data-breach-allegedly-affecting-800000-citizens.jpg Italian politicians called Monday for better protection of citizens’ online data following a probe into a hacking scheme that allegedly breached law enforcement, tax authority and other sensitive public data. According to prosecutors in Milan, the data of at least 800,000 Italians was compromised ...
Read More »U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing
U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing https://firewall.firm.in/wp-content/uploads/2024/10/white-house.png Oct 29, 2024Ravie LakshmananDigital Security / Data Privacy The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers, and Federal Departments and Agencies. “The USG follows TLP markings ...
Read More »Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services https://firewall.firm.in/wp-content/uploads/2024/10/machine.png Oct 28, 2024Ravie LakshmananCloud Security / Cyber Attack A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset codenamed CloudScout. “The CloudScout toolset is capable of retrieving ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











