Website Preloader

The ProcessBolt Platform

agsdix-c370-one-solution

ProcessBolt AI

AI-assisted vendor risk management, and real-time threat monitoring platform. 

agsdix-c370-key-insights

ThreatScape

Attack surface management and security rating solution.

agsdix-c370-manual-reviews

DocAI

Document intelligence and analytics.

agsdix-c370-collaboration

Share Center

Secure and timebound document sharing for the enterprise.

agsdix-c370-integration

Assessment & RFP Response Solution

Answer questionnaires using Knowledge Base and documents with AI assistance.

Cybersecurity News

Derrick Lowe, Chief Security Officer of Orlando Health, Joins ProcessBolt’s Board of Directors

ProcessBolt is pleased to announce that Derrick Lowe, CSO of Orlando Health and one of Becker Hospital Review’s 60 “CISOs to Know” for 2023, is joining ProcessBolt’s board of directors.


Vpn Dns Vpn Service Mullvad Dns Traffic App Android
- Android devices on the latest version of the operating system were discovered to be impacted by a vulnerability that exposes DNS queries upon switching VPN servers despite the activation of the "Always-on VPN" functionality while blocking connections that do not have VPN, according to . Such a security flaw, which stems from the utilization of apps directly communicating with the getaddrinfo C function, enables DNS traffic leaks in the event of an active VPN without any DNS server or issues ... [Read More]


Vpn Traffic Dhcp Network Server Dhcp Server
- TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering. TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet ... [Read More]


Group Apt42 Mandiant Journalists Hackers Report
- Mandiant Says APT42 Members Have Been Posing as Journalists to Steal Troves of Data Members of an Iranian state hacking group have been observed posing as journalists and event organizers from The Washington Post, The Economist and other major news outlets as part of an effort to harvest credentials and hack into global cloud networks. Mandiant on Wednesday published a report on APT42, an Iranian threat actor that uses "enhanced social engineering schemes to gain access to victim networks, ... [Read More]


Apps Risk Files Android Microsoft Vulnerability
- A new threat at a vast scale has just been revealed, and it impacts multiple Android apps with hundreds of millions of installs—here's what you need to know... Microsoft has discovered a serious new security vulnerability that impacts popular Android apps and puts billions of devices at risk. "The implications of this vulnerability pattern" its report warns, "include arbitrary code execution and token theft, depending on an application's implementation." The vulnerability relates to ... [Read More]

Source: forbes.com

Malware Soho Cloud Routers Cuttlefish Credentials
- Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, CloudFlare, Docker, BitBucket, Alibaba Cloud and other cloud-based services. "With the stolen key material, the actor not only retrieves cloud resources associated with the targeted entity but gains a foothold into that cloud ecosystem, " Black Lotus Labs researchers noted. "To exfiltrate data, the threat actor first creates ... [Read More]


File Data Researchers Deserialization Flaw R
- Deserialization Vulnerability Allows for Remote Code Execution A high-risk flaw in R statistics programming language could lead to a supply chain hack, warn security researchers who said they uncovered a deserialization flaw. CVE-2024-27322 . Kasimir Schulz, principal security researcher at HiddenLayer - which published Monday research detailing the vulnerability, told Information Security Media Group that no attacks have been reported and researchers were able to "catch up before anyone can ... [Read More]


Gitlab Vulnerability Vulnerabilities Hackers Cybersecurity Days
- US CISA Orders Federal Agencies to Apply January Patch The U.S. federal government's cybersecurity agency warned that hackers are exploiting a vulnerability in DevOps platform GitLab that the open-core company patched in January. The Cybersecurity and Infrastructure Security Agency on Wednesday added the vulnerability, tracked as , to its running list of hacker exploits. CISA gave federal agencies three weeks to ensure they've applied a patch and advised all GitLab customers to ensure they're ... [Read More]


Malware Offlrouter Vba Macro Malware Cisco Talos Ukraine Cybersecurity
- As per recent media reports , certain government networks in Ukraine have been infected with the Offlrouter malware since 2015. The Offlrouter malware Ukraine has managed to escape detection for nearly a decade now. However, VBA macro malware has recently come under the radar of Cisco Talos.  In the article, we will dive into the details of the Offlrouter malware Ukraine and what the threat implies for cybersecurity practices.   Offlrouter Malware Ukraine: Initial Discovery Based on ... [Read More]


Javascript Code Package File Job Attackers Developers
- North Korean Prediliction for Elaborate Social Engineering Attacks Strikes Again Likely North Korean threat actors are using fake job interviews to trick software developers into downloading disguised Python backdoors as part of an ongoing espionage campaign. The attackers construct fake job interview scenarios designed to appear legitimate and enticing to developers seeking employment opportunities. Once a victim has been lured in, the attackers instruct them to download seemingly harmless ... [Read More]


Attacks Credential Services Okta Threat Researchers
- Identity and access management service provider Okta warned of what it described as an "unprecedented" surge in credential-stuffing attacks against online services. In an April 27 advisory , Okta said the increase in credential-stuffing attacks its threat researchers observed over the past month was facilitated by the broad availability of residential proxy services, "combo lists" of previously stolen credentials, and scripting tools. In a "small percentage" of cases, the attacks it observed ... [Read More]


You May Also Like…

50 Companies that will be Hacked in 2024

50 Companies that will be Hacked in 2024

Introduction ProcessBolt ThreatScape is an attack surface monitoring tool that uses publicly available information to analyze the strength of an organization’s information security program....

read more