Ransomware dwell time hits new low

Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median dwell tim… Continue reading Ransomware dwell time hits new low

Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

Several vulnerabilities that affect most VPN products out there can be exploited by attackers to read user traffic, steal user information, or even attack user devices, researchers have discovered. “Our attacks are not computationally expensive, … Continue reading Almost all VPNs are vulnerable to traffic-leaking TunnelCrack attacks

How to accelerate and access DDoS protection services using GRE

As we entered 2023, the cybersecurity landscape witnessed an increase in sophisticated, high-volume attacks, according to Gcore. The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most common and amounted to 52% of total attacks… Continue reading How to accelerate and access DDoS protection services using GRE

Attack Surface Management: Identify and protect the unknown

In this Help Net Security video, Brianna McGovern, Product Manager, Attack Surface Management, NetSPI, discusses Attack Surface Management (ASM). Attack Surface Management detects known, unknown, and potentially vulnerable public-facing assets and chan… Continue reading Attack Surface Management: Identify and protect the unknown

The rise in cyber extortion attacks and its impact on business security

In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions. A recent report revealed that cyber extortion activity reached the highest volu… Continue reading The rise in cyber extortion attacks and its impact on business security

Profiling a C&C Domains Portfolio from the DNC (Democratic National Committee) Cyber Attack Campaign

The following is a list o…Profiling a C&C Domains Portfolio from the DNC (Democratic National Committee) Cyber Attack Campaign was first posted on June 23, 2023 at 6:20 pm.©2021 "". Use of this feed is for personal non-commerc… Continue reading Profiling a C&C Domains Portfolio from the DNC (Democratic National Committee) Cyber Attack Campaign

A List of Personal Email Address Accounts and C&C Domains from the DNC (Democratic National Committee) Cyber Attack Campaign

The following is a list of personal email address accounts and domain C&C servers from the DNC (Democratic National Committee)… Continue reading A List of Personal Email Address Accounts and C&C Domains from the DNC (Democratic National Committee) Cyber Attack Campaign

MOVEit Transfer zero-day attacks: The latest info

There’s new information about the zero-day vulnerability in Progress Software’s MOVEit Transfer solution exploited by attackers and – more importantly – patches and helpful instructions for customers. The MOVEit Transfer zero-day and … Continue reading MOVEit Transfer zero-day attacks: The latest info

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to grab corporate data. “[The vulnerability] could lead to escalated privileges and potential… Continue reading Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

Arbitrary Code Execution Over Radio

Computers connected to networks are constantly threatened by attackers who seek to exploit vulnerabilities wherever they can find them. This risk is particularly high for machines connected to the Internet, …read more Continue reading Arbitrary Code Execution Over Radio