Webinar – Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges
Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security...
Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts. However, many security...
A four-year-old critical security flaw impacting Fortinet FortiOS SSL has emerged as one of the most routinely and frequently exploited...
In collaboration with CISA, the NSA, and the FBI, Five Eyes cybersecurity authorities have issued today a list of the...
The malicious Rilide Stealer Chrome browser extension has returned in new campaigns targeting crypto users and enterprise employees to steal...
Serco Inc, the Americas division of multinational outsourcing company Serco Group, has disclosed a data breach after attackers stole the...
Microsoft's new Azure Active Directory Cross-Tenant Synchronization (CTS) feature, introduced in June 2023, has created a new potential attack surface...
Hacktivist groups that operate for political or ideological motives employ a broad range of funding methods to support their operations....
The privacy-focused search engine Brave Search has finally introduced its own, independent image and video search capabilities, breaking free from...
The list of LOLBAS files - legitimate binaries and scripts present in Windows that can be abused for malicious purposes,...
The enormous global costs of ransomware attacks on the manufacturing sector have been laid bare in a new analysis by...
Security vendor Ivanti has disclosed yet another critical vulnerability in its products, linked to a previous zero-day that was exploited...
With the deployment of software-as-a-service tools, like Workday and Salesforce to name a few, workers are now spending more time...
Several members of an organized crime group (OGC) have been sentenced after police secretly monitored tens of thousands of messages...
Around 600 global Citrix servers have been compromised by a zero-day exploit enabling webshells to be installed, according to a non-profit...
Humans cannot detect deepfake speech 27% the time, researchers from University College London (UCL) have found during a recent study.The...
Microsoft Threat Intelligence has recently detected a series of highly targeted social engineering attacks employing credential theft phishing lures delivered...
Threat intelligence experts from Group-IB have shed light on the hacktivist collective known as Mysterious Team Bangladesh.In a report published...
Cisco Talos has published a list of numerous vulnerabilities in small and home office (SOHO) and industrial wireless routers.In their...
Cyber-attacks against government agencies and public sector services are up 40% in the second quarter of 2023 compared to the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target Android users. "Campaigns...
Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to deploy web shells, according to...
The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data...
Cybersecurity researchers have discovered a new version of malware called Rilide that targets Chromium-based web browsers to steal sensitive data...