admin
June 30, 2023
Charming Kitten, the nation-state actor affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC), has been attributed to...
admin
June 30, 2023
In today's fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way...
admin
June 30, 2023
Meta's WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of...
admin
June 30, 2023
An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into a proxy...
admin
June 30, 2023
MITRE has released its annual list of the Top 25 "most dangerous software weaknesses" for the year...
admin
June 29, 2023
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that's...
admin
June 29, 2023
Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse.
The malware "represents a significant...
admin
June 29, 2023
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure...
admin
June 29, 2023
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in attacks...
admin
June 29, 2023
Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal...
admin
June 29, 2023
A critical security flaw has been disclosed in miniOrange's Social Login and Register plugin for WordPress that could enable...
admin
June 29, 2023
A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild with capabilities to harvest sensitive...
admin
June 28, 2023
Drones that don't have any known security weaknesses could be the target of electromagnetic fault injection (EMFI)...
admin
June 28, 2023
Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that's estimated to have made...
admin
June 28, 2023
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to...
admin
June 28, 2023
A ransomware threat called 8Base that has been operating under the radar for over a year has...
admin
June 28, 2023
Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead to remote code execution...
admin
June 27, 2023
A new process injection technique dubbed Mockingjay could be exploited by threat actors to bypass security solutions...
admin
June 27, 2023
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution...
Beyond Asset Discovery: How Attack Surface Management Prioritizes Vulnerability Remediation
4 min read
admin
June 27, 2023
As the business environment becomes increasingly connected, organizations’ attack surfaces continue to expand, making it challenging to...