Fisa Academy

Financial institutions face increasing cyberattacks that are more destructive

Financial institutions are facing a growing threat from cybercriminals and threat actors, with Contrast Security highlighting the significant risks they face in the digital landscape. A recent survey conducted by Contrast Security revealed that 64% of financial institutions experienced cybersecurity incidents in the past...

Common Weakness Enumeration (CWE) and the Explanation of the CWE Top 25 – Source: www.hackerone.com

The Common Weakness Enumeration (CWE) system is designed to categorize security flaws in software and hardware, aiming to prevent vulnerabilities that can be exploited by malicious actors. With over 600 categories detailing different types of vulnerabilities and bugs, CWE serves as a valuable resource...
spot_img

Keep exploring

Embargo ransomware escalates attacks to cloud environments

 Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now...

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.

 According to a Sophos survey of 5,000 IT and cybersecurity leaders released in...

Ransomware and AI threats drive surge in cybersecurity investments

Infosecurity Europe, the premier information security event, will take place at ExCeL London...

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

CISA ransomware warning program will launch this year

The Cybersecurity and Infrastructure Security Agency, an arm of the Department of Homeland...

Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment

 The transaction, visible on Bitcoin's blockchain, suggests the victim of one of the...

Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical...

Ransomware gang claims they stole 6TB of Change Healthcare data

 The BlackCat/ALPHV ransomware gang has officially claimed responsibility for a cyberattack on Optum, a...

what you need to know

The Guidelines for Secure AI System Development, published by the NCSC and developed with...

Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

 A dormant package available on the Python Package Index (PyPI) repository was updated...

SmartScreen Vulnerability: CVE-2024-21412 Facts and Fixes

On Feb. 13, 2024, Microsoft issued a patch for CVE-2024-21412, a Microsoft Defender SmartScreen vulnerability revolving around...

Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

 The China-linked threat actor known as Mustang Panda has targeted various Asian countries...

Latest articles

Financial institutions face increasing cyberattacks that are more destructive

Financial institutions are facing a growing threat from cybercriminals and threat actors, with Contrast...

Common Weakness Enumeration (CWE) and the Explanation of the CWE Top 25 – Source: www.hackerone.com

The Common Weakness Enumeration (CWE) system is designed to categorize security flaws in software...

AMD and Google reveal vulnerability in Zen processor microcode

A high-severity microcode signature verification vulnerability in AMD's Zen CPUs was recently disclosed following...

Episode 154: Hijacked Line – The Cyber Post

Conor Freeman, a notorious online thief, has recently been the subject of much controversy...