How Will the Metaverse Affect Cloud Security?
The metaverse is an immersive digital world of augmented reality. While supporting a virtual universe relies on cloud storage, questions...
The metaverse is an immersive digital world of augmented reality. While supporting a virtual universe relies on cloud storage, questions...
Fortinet addressed a critical authentication bypass vulnerability that impacted FortiGate firewalls and FortiProxy web proxies. Fortinet addressed a critical authentication...
Threat actors have stolen 2 million Binance Coins (BNB), worth $566 million, from the popular Binance Bridge. Hackers have reportedly...
Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a...
During the pandemic, lockdowns forced people to stay at home and do their shopping online, which was mirrored in point-of-sale...
Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a...
A bug in Linux Kernel 5.19.12 that was released at the end of September 2022 can potentially damage the displays...
Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack...
Good cyber hygiene starts with buy-in from across the enterprise. Discover how CISOs can establish a company-wide security culture to...
Cisco fixed high-severity flaws in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. Cisco announced...
The City of Tucson, Arizona disclosed a data breach, the incident was discovered in May 2022 and impacted 123,500 individuals....
The Australian Federal Police (AFP) arrested a 19-year-old teen from Sydney for attempting to use data from the Optus data...
Researchers at cybersecurity firm Resecurity spotted a new group of hacktivists targeting financial institutions in Egypt, Resecurity, a California-based cybersecurity...
Introduction We are often asked how targets are infected with malware. Our answer is nearly always the same: (spear) phishing....
Avast released a free decryptor for variants of the Hades ransomware tracked as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ ....
In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Hundreds of Microsoft SQL servers all over the world have been infected with a new piece of malware tracked as Maggie....
Bad news for the Australian telecommunications industry, the largest company in the country Telstra suffered a data breach. Australia’s largest...
OnionPoison: researchers reported that an infected Tor Browser installer has been distributed through a popular YouTube channel. Kaspersky researchers discovered...
While performing regular threat hunting activities, we identified multiple downloads of previously unclustered malicious Tor Browser installers. According to our...
Dr. Ivan Pavlov once said: “If you want new ideas, read old books.” The same applies with cybersecurity best practices....
For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and...
William Malik, VP of Infrastructure Strategies, shares his opinions on the goals and objectives outlined in the CISA Strategic Plan...