admin
November 18, 2022
The LodaRAT malware has resurfaced with new variants that are being deployed in conjunction with other sophisticated...
admin
November 18, 2022
Threat hunting is the process of looking for malicious activity and its artifacts in a computer system...
admin
November 18, 2022
The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300 companies across...
admin
November 18, 2022
An ongoing supply chain attack has been leveraging malicious Python packages to distribute malware called W4SP Stealer,...
admin
November 17, 2022
A China-based financially motivated group is leveraging the trust associated with popular international brands to orchestrate a...
admin
November 17, 2022
Hackers tied to the North Korean government have been observed using an updated version of a backdoor...
admin
November 17, 2022
A Ukrainian national who has been wanted by the U.S for over a decade has been arrested...
admin
November 17, 2022
On average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organization, such as...
admin
November 17, 2022
Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to...
admin
November 17, 2022
Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of...
admin
November 16, 2022
Hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing personal identifiable information (PII), new...
admin
November 16, 2022
According to a recent survey, 90% of CISOs running teams in small to medium-sized enterprises (SMEs) use a...
admin
November 16, 2022
Cybersecurity researchers have unearthed new samples of malware called RapperBot that are being used to build a...
admin
November 16, 2022
Internet behemoth Google on Tuesday said it plans to roll out Privacy Sandbox for Android in beta...
Critical RCE Flaw Reported in Spotify’s Backstage Software Catalog and Developer Platform
2 min read
admin
November 15, 2022
Spotify's Backstage has been discovered as vulnerable to a severe security flaw that could be exploited to...
admin
November 15, 2022
Credit: Marina Minkin
A novel attack method has been disclosed against a crucial piece of technology called time-triggered ethernet...
admin
November 15, 2022
Cybersecurity researchers have disclosed details of now-patched flaws in Zendesk Explore that could have been exploited by...
Deep Packet Inspection vs. Metadata Analysis of Network Detection & Response (NDR) Solutions
4 min read
admin
November 15, 2022
Today, most Network Detection and Response (NDR) solutions rely on traffic mirroring and Deep Packet Inspection (DPI)....
admin
November 15, 2022
A suspected Chinese state-sponsored actor breached a digital certificate authority as well as government and defense agencies...
admin
November 15, 2022
Internet giant Google has agreed to pay a record $391.5 million to settle with 40 states in...