How to Set Up a Threat Hunting and Threat Intelligence Program
Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this...
Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this...
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large...
Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship...
Western Digital has taken its store offline and sent customers data breach notifications after confirming that hackers stole sensitive personal...
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A new proof-of-concept (PoC) exploit for an actively exploited PaperCut vulnerability was released that bypasses all known detection rules. The PaperCut...
Twitter disclosed that a 'security incident' caused private tweets sent to Twitter Circles to show publicly to users outside of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its...
PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack...
Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a...
Android security updates released this month patch a high-severity vulnerability exploited as a zero-day to install commercial spyware on compromised...
Security researchers warn that the 'Advanced Custom Fields' and 'Advanced Custom Fields Pro' WordPress plugins, with millions of installs, are...
A new Android malware called 'FluHorse' has been discovered, targeting users in Eastern Asia with malicious apps that imitate legitimate...
This week's ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down...
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented...
The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as...
PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack...
Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools for businesses to optimize their...
Italian corporate banking clients are the target of an ongoing financial fraud campaign that has been leveraging a new web-inject...