admin
January 11, 2024
The compromise of Mandiant's X (formerly Twitter) account last week was likely the result of a "brute-force...
admin
January 11, 2024
A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure have been chained...
admin
January 11, 2024
Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit...
admin
January 10, 2024
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how...
admin
January 10, 2024
A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign...
admin
January 10, 2024
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted...
admin
January 10, 2024
The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as...
admin
January 10, 2024
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates...
admin
January 10, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV)...
admin
January 9, 2024
A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam...
admin
January 9, 2024
Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S., European Union, and Latin...
admin
January 9, 2024
Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, Miro, and others promote the collaborative...
admin
January 9, 2024
A security flaw has been disclosed in Kyocera’s Device Manager product that could be exploited by bad actors to...
admin
January 9, 2024
Threat actors are resorting to YouTube videos featuring content related to cracked software in order to entice...
Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

10 min read
admin
January 8, 2024
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon...
admin
January 8, 2024
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s...
admin
January 8, 2024
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit...
admin
January 8, 2024
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that...
admin
January 8, 2024
The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct...
admin
January 8, 2024
Threat actors affiliated with the Democratic People's Republic of Korea (also known as North Korea) have plundered...