Headlines

Morgan Sarah

Hi, I'm Sarah Morgan, an investigative journalist focusing on counterterrorism and intelligence. I'm driven by the belief that understanding the root causes of terrorism and addressing security gaps can contribute to a safer society.

Examining the Escalating Threat: Iranian Hacking Group Tortoiseshell Unleashes IMAPLoader Malware Assaultswordpress,cybersecurity,Iranianhackinggroup,Tortoiseshell,IMAPLoader,malwareassaults

Examining the Escalating Threat: Iranian Hacking Group Tortoiseshell Unleashes IMAPLoader Malware Assaults

The IT Professional’s Blueprint for Compliance Introduction In today’s digital landscape, the importance of cybersecurity cannot be overstated. With cyber threats growing in frequency and sophistication, it is more crucial than ever for organizations to implement comprehensive security measures to protect their sensitive data. IT professionals play a pivotal role in ensuring compliance with various…

Read More
The Akira Ransomware Attack: Unveiling the Impact on BHI Energywordpress,tagnames,AkiraRansomwareAttack,Impact,BHIEnergy

The Akira Ransomware Attack: Unveiling the Impact on BHI Energy

Westinghouse Subsidiary BHI Energy Faces Akira Ransomware Attack The Incident In June, BHI Energy, an energy services provider and subsidiary of Westinghouse, fell victim to an Akira ransomware attack. The incident was first discovered by BHI’s IT team, who noticed network data being encrypted. Promptly, BHI initiated an investigation and sought external expertise by engaging…

Read More
Critical Security Vulnerabilities Patched in Latest Firefox and Chrome Updates: An Urgent Call for User Actionfirefox,chrome,securityvulnerabilities,patch,updates,useraction

Critical Security Vulnerabilities Patched in Latest Firefox and Chrome Updates: An Urgent Call for User Action

Firefox and Chrome Updates Patch High-Severity Vulnerabilities This week, both Mozilla and Google released software updates for their respective web browsers, Firefox and Chrome, in order to address multiple high-severity vulnerabilities. These vulnerabilities pose serious security risks to users and could potentially be exploited by attackers to execute arbitrary code and escape the browser sandbox….

Read More
Cybersecurity Alert: Citrix Urges Patching While Researchers Release Exploitwordpress,cybersecurity,Citrix,patching,researchers,exploit

Cybersecurity Alert: Citrix Urges Patching While Researchers Release Exploit

Critical Citrix NetScaler Vulnerability Exposes Users to Exploitation This week, Citrix customers have been grappling with a high-profile security vulnerability affecting their NetScaler application delivery controller (ADC) and Gateway products. On September 23, Citrix released an urgent patch for CVE-2023-4966, a sensitive information disclosure vulnerability. Unfortunately, this critical security update comes alongside the release of…

Read More
Exploiting Roundcube Webmail Zero-Day: Unmasking Russian Hackerswordpress,webmail,zero-day,hacking,cybersecurity,Roundcube,Russianhackers

Exploiting Roundcube Webmail Zero-Day: Unmasking Russian Hackers

[object Object] Cybersecurity–wordpress,webmail,zero-day,hacking,cybersecurity,Roundcube,Russianhackers > The image is for illustrative purposes only and does not depict the actual situation. You might want to read ! Chinese Hackers Target US Critical Infrastructure: Mandiant Intelligence Chief Raises Alarm over “Volt Typhoon” Censys Raises $75M in Funding to Enhance Attack Surface Management Technology Censys Scores $75M Investment to Revolutionize…

Read More
Chinese Hackers Target US Critical Infrastructure: Mandiant Intelligence Chief Raises Alarm over "Volt Typhoon"wordpress,cybersecurity,Chinesehackers,UScriticalinfrastructure,MandiantIntelligence,VoltTyphoon

Chinese Hackers Target US Critical Infrastructure: Mandiant Intelligence Chief Raises Alarm over “Volt Typhoon”

Mandiant Intelligence Chief Raises Alarm Over China’s ‘Volt Typhoon’ Hackers in US Critical Infrastructure In a keynote speech at the 2023 ICS Cybersecurity Conference in Atlanta, John Hultquist, the chief analyst at Mandiant Intelligence, discussed the growing threat posed by the Chinese hacking group known as Volt Typhoon. Hultquist urged defenders of critical infrastructure to…

Read More
Unveiling the Code: A Comprehensive Analysis of Vendor Support for Secure PLC Codingwordpress,codeanalysis,vendorsupport,securecoding,PLCcoding

Unveiling the Code: A Comprehensive Analysis of Vendor Support for Secure PLC Coding

New Project Analyzes and Catalogs Vendor Support for Secure PLC Coding Introduction A new project presented at SecurityWeek’s ICS Cybersecurity Conference aims to simplify the implementation of secure coding practices for programmable logic controller (PLC) programmers. The project, led by Fortiphyd Logic, focuses on analyzing and cataloging useful files and functions from each PLC vendor….

Read More
Satellite Systems Under Threat: Building a Cybersecurity Framework to Mitigate Riskssatellitesystems,cybersecurity,threat,cybersecurityframework,mitigaterisks

Satellite Systems Under Threat: Building a Cybersecurity Framework to Mitigate Risks

Cyber Threats to Satellites Satellite systems play a crucial role in supporting communication, weather monitoring, navigation, internet access, and more. However, these systems face numerous threats that compromise security and integrity. The threats faced by satellite systems are diverse and range from denial-of-service (DoS) attacks and malware infiltration to unauthorized access and damage from other…

Read More
The Evolution of Zero-Day Attacks: Cisco Devices Continue to Be Prime Targetswordpress,cybersecurity,zero-dayattacks,Ciscodevices,networksecurity,vulnerability,hacking,cyberthreats,databreach,networkinfrastructure

The Evolution of Zero-Day Attacks: Cisco Devices Continue to Be Prime Targets

Malware & Threats: Number of Cisco Devices Hacked via Zero-Day Remains High as Attackers Update Implant Introduction The number of Cisco devices hacked through the exploitation of two new zero-day vulnerabilities remains very high, but recent scans appeared to show a significant drop due to the attackers updating their implant. Unidentified hackers have been exploiting…

Read More
The Elusive Backdoor: Modified Cisco Devices Evade Detection1.Cybersecurity2.NetworkSecurity3.CiscoDevices4.BackdoorDetection5.ModifiedDevices6.Malware7.NetworkInfrastructure8.ThreatDetection9.IntrusionPrevention

The Elusive Backdoor: Modified Cisco Devices Evade Detection

Report: The IT Professional’s Blueprint for Compliance Introduction In an increasingly interconnected and digital world, the importance of cybersecurity cannot be overstated. With the rapid proliferation of sophisticated cyber threats, organizations are under constant pressure to protect their sensitive data and comply with various frameworks, such as the Health Insurance Portability and Accountability Act (HIPAA),…

Read More