admin
April 3, 2023
Data storage devices maker Western Digital on Monday disclosed a "network security incident" that involved unauthorized access...
“It’s The Service Accounts, Stupid”: Why Do PAM Deployments Take (almost) Forever To Complete

7 min read
admin
April 3, 2023
Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative...
admin
April 3, 2023
A piece of new information-stealing malware called OpcJacker has been spotted in the wild since the second half of...
admin
April 1, 2023
Microsoft has patched a misconfiguration issue impacting the Azure Active Directory (AAD) identity and access management service...
admin
April 1, 2023
Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors...
admin
April 1, 2023
Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder...
admin
March 31, 2023
Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to...
admin
March 31, 2023
The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and...
admin
March 31, 2023
The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members...
admin
March 31, 2023
Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows...
admin
March 30, 2023
Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to...
admin
March 30, 2023
A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux...
admin
March 30, 2023
A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in...
admin
March 30, 2023
Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy...
AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

2 min read
admin
March 30, 2023
A new "comprehensive toolset" called AlienFox is being distributed on Telegram as a way for threat actors to harvest...
admin
March 30, 2023
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm...
admin
March 29, 2023
Malware analysis is an essential part of security researcher's work. But working with malicious samples can be...
admin
March 29, 2023
The emergence of smart mobility services and applications has led to a sharp increase in the use...
admin
March 29, 2023
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to...
admin
March 29, 2023
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at...