Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sec… Continue reading Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

Posted in Uncategorized

Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that could lead to code execution.
The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS score: 8.1), affects S… Continue reading Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

Posted in Uncategorized

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus RedDelta threat actor to deliver a customized version of the PlugX backdoor between July 2023 and December 2024.
“The group used lure documents themed around the 202… Continue reading RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

Posted in Uncategorized

CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer

Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding to distribute a cryptocurrency miner that’s disguised as an employee CRM application as part of a supposed recruitment process.
“The attack begins with … Continue reading CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer

Posted in Uncategorized