What’s the Difference Between CSPM & SSPM?
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple's macOS...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Chinese state-sponsored hacking group APT41 was found abusing the GC2 (Google Command and Control) red teaming tool in data...
A new Android trojan called ‘Chameleon’ has been targeting users in Australia and Poland since the start of the year,...
QBot malware is now distributed in phishing campaigns utilizing PDFs and Windows Script Files (WSF) to infect Windows devices. Qbot...
Ex-Conti ransomware members have teamed up with the FIN7 threat actors to distribute a new malware family named 'Domino' in...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new QBot malware campaign is leveraging hijacked business correspondence to trick unsuspecting victims into installing the malware, new findings...
Israeli spyware vendor QuaDream is allegedly shutting down its operations in the coming days, less than a week after its...
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
A new strain of malware developed by threat actors likely affiliated with the FIN7 cybercrime group has been put to...
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding,...
A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming tool known as...
Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to fly under...
The Deep, Dark Web – The Underground – is a haven for cybercriminals, teeming with tools and resources to launch...
A novel credential-stealing malware called Zaraza bot is being offered for sale on Telegram while also using the popular messaging...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of a high-severity Android vulnerability believed to have been exploited...
Image: Norebbo The LockBit ransomware gang has created encryptors targeting Macs for the first time, likely becoming the first major...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new Android malware named 'Goldoson' has infiltrated Google Play through 60 legitimate apps that collectively have 100 million downloads....
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and...
Source: NCR Aloha NCR is suffering an outage on its Aloha point of sale platform after being hit by an...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...