More CyberWatch

September 12, 2024

Cutting it Close: Phishers Using CapCut in Data Heists

A newly uncovered phishing campaign is exploiting the growing popularity of CapCut, a video editing tool developed by ByteDance. The attackers are utilizing a technique known as reputational hijacking, which allows them to embed malware within a legitimate-looking package, bypassing Smart App Control (SAC) and leaving users vulnerable to data theft and system compromise. This campaign represents a significant escalation in the tactics used by threat actors to evade detection.

Read more
September 11, 2024

Coinfiscated: Fighting Crypto Heists in Web3

From early Bitcoin-exchange hacks to today's multi-million-dollar DeFi exploits, crypto heists are becoming more frequent, and the stakes are higher than ever. Today's report explores some of the biggest heists, what makes them possible, and why Web3 security is more critical than ever.

Read more
September 4, 2024

US Companies on the Front Lines of New Conflicts, Says Spy Chief

American businesses are on the front line of the nation’s looming conflicts with China and other adversaries like Russia and Iran, the U.S. spy chief Director of National Intelligence Avril Haines warned last week. Learn why the relationship between the private sector and the intelligence community needs to outgrow the confines of the customer/vendor nexus and go beyond its current information-sharing paradigm.

Read more
September 3, 2024

Zero-Day Vulnerability Actively Exploited in Versa Director

A vulnerability allowing malicious files to be uploaded to the Versa Director GUI by users with System Admin credentials is being exploited. Stay informed with CyberWatch.

Read more
August 29, 2024

Hertz So Good: When Ransomware Hits the Airwaves

In May of 2024, a national association for amateur radio was hit by a severe ransomware attack that encrypted multiple internal systems, including desktops, laptops, and both Windows and Linux servers. The attack was coordinated by organized criminals and enabled by information purchased on the dark web. Learn how their response can help your organization avoid becoming a casualty of the ransomware trend.

Read more
August 28, 2024

Network Segmentation and Subnetting in Modern IT Security

Chief among the multi-layered strategies companies use to safeguard their sensitive data is network segmentation. This approach, which involves dividing a network into smaller, isolated segments, goes a long way toward stymying the efforts of malicious actors. The significance of network segmentation and subnetting, along with their many benefits are discussed ahead.

Read more
August 28, 2024

Still Stirring the Honeypot: Why an Old Log4j Vulnerability Still Packs a Punch

New threats emerge daily, but some old network vulnerabilities stubbornly refuse to fade away. One such vulnerability is Log4j, better known as Log4Shell. Discovered nearly three years ago, this critical flaw continues to wreak havoc across industries. Dive into the details and explore why this vulnerability remains such a persistent threat.

Read more
August 26, 2024

The Blast-RADIUS Attack Is a Wake-Up Call for the Cybersecurity Industry

The Blast-RADIUS incident is a wake-up call for the cybersecurity industry, regulatory bodies, and enterprises to urgently transition to modern, more secure standards and protocols.

Read more
August 26, 2024

Zero Day Vulnerability Patched in Google Chrome and Microsoft Edge

Google Chrome and Microsoft Edge have released updates for an actively exploited Zero Day Vulnerability. Google is aware that an exploit for this CVE is circulating publicly.

Read more