Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to minimize...
Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to minimize...
Refreshed 'cyber security toolkit' helps board members to govern online risk I am delighted to announce the launch of the...
A misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS...
A new modular toolkit called ‘AlienFox’ allows threat actors to scan for misconfigured servers to steal authentication secrets and credentials...
A Russian hacking group tracked as TA473, aka 'Winter Vivern,' has been actively exploiting vulnerabilities in unpatched Zimbra endpoints since...
Multiple malware botnets actively target Cacti and Realtek vulnerabilities in campaigns detected between January and March 2023, spreading ShellBot and Moobot...
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies today to patch security vulnerabilities exploited as zero-days in...
Ukraine's cyberpolice has arrested members of a fraud gang that stole roughly $4,300,000 from over a thousand victims across the...
Microsoft has shared more information on what malicious embedded files OneNote will soon block to defend users against ongoing phishing...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated remote code...
A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in the IEEE 802.11...
A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and...
A new "comprehensive toolset" called AlienFox is being distributed on Telegram as a way for threat actors to harvest credentials...
Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy for data management....
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on...
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm on...
Google's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install...
Taiwanese hardware vendor QNAP warns customers to secure their Linux-powered network-attached storage (NAS) devices against a high-severity Sudo privilege escalation...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French...
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and...
Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper...