Hello

New Stealthy Shikitega Malware Targeting Linux Systems and IoT Devices

“New Stealthy Shikitega Malware Targeting Linux Systems” is a brand-new piece of stealthy Linux malware that uses a multi-stage infection chain to infiltrate endpoints and IoT devices and deposit further payloads. In a fresh research released on Tuesday, AT&T Alien Labs stated that an attacker “may take complete control of the system, in addition to…

Overview of Top Mobile Security Threats in 2022

Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments. However, the threat landscape always reminds us how vulnerable smartphones can be. Discover the Most Significant Mobile Security Risks of 2022 in a Comprehensive Summary. Consider the recent discovery by Oversecured,…

Check Point Software acquires Dome9 to beef up multi-cloud options

The Israel-based cyber security firm Check Point Software acquired compatriot Dome9 with multi-cloud capability which offers a SaaS platform that aims to visualize organizations’ security postures in the public cloud. Companies can have verifiable infrastructure security for every public cloud, including the behemoths of AWS, Azure and Google Cloud Platform. This shall enhance the ability…

Unpatched Remote Hacking Flaw Disclosed in Fortinets FortiWeb WAF

Details have emerged about a new unpatched security vulnerability in Fortinet’s web application firewall (WAF) appliances that could be abused by a remote, authenticated attacker to execute malicious commands on the system. “An OS command injection vulnerability in FortiWeb’s management interface (version 6.3.11 and prior) can allow a remote, authenticated attacker to execute arbitrary commands…

Top 30 Critical Security Vulnerabilities Most Exploited by Hackers

Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publicly disclosed flaws to their advantage. “Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets,…

Leveraging Cloud for Disaster Recovery

As public cloud infrastructures mature and storage costs decrease, more and more enterprises are looking to the cloud to implement their disaster recovery (DR) plans. Virtually every recent survey of IT trends shows that secondary backup in general and DR in particular are highly compelling cloud use cases, and are often the first forays of…

Get in touch

Protect your business

If you are looking for reliable and efficient solutions to enhance your business operations, Mindfire is the perfect partner for you. Contact us today to learn more about our services and how we can help you achieve your goals. Whether you need Cyber Security Services, Managed Security Services (MSS), Consulting Services, Cyber Risk Management Services, Cloud Services, Digital Services, or Digital Transformation, our team of experts is here to assist you every step of the way. Don't hesitate to get in touch with us and take your business to the next level with Mindfire.