admin
January 12, 2024
The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated...
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
5 min read
admin
January 12, 2024
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected...
admin
January 12, 2024
GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to...
admin
January 12, 2024
Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy...
admin
January 12, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server to...
admin
January 11, 2024
Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop
The...
admin
January 11, 2024
Cybersecurity researchers have identified an updated version of a macOS information stealer called Atomic (or AMOS), indicating that the...
admin
January 11, 2024
The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat...
admin
January 11, 2024
Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache OfBiz open-source Enterprise...
admin
January 11, 2024
A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems (CMS),...
admin
January 11, 2024
The compromise of Mandiant's X (formerly Twitter) account last week was likely the result of a "brute-force...
admin
January 11, 2024
A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure have been chained...
admin
January 11, 2024
Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit...
admin
January 10, 2024
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how...
admin
January 10, 2024
A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign...
admin
January 10, 2024
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted...
admin
January 10, 2024
The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was previously known as...
admin
January 10, 2024
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates...
admin
January 10, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV)...
admin
January 9, 2024
A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam...