Why the Mitre Engenuity ATT&CK Evaluations Matter
This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions'...
This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions'...
Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are...
Some of the biggest stars around have seen content placed on their YouTube accounts without permission over the last couple...
The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses. This...
The US Department of Justice (DoJ) and Microsoft have taken the sting out of two operations believed to be controlled...
Ledger is one of the biggest hardware cryptocurrency wallets around and scammers have noticed. Phishing mails are in circulation, hoping...
A Ukrainian man was sentenced in the US to 5 years in prison for his criminal activity in the cybercrime...
Microsoft obtained a court order to take over seven domains used by the Russia-linked APT28 group to target Ukraine. Microsoft...
Hamas-linked threat actors conducted an elaborate campaign aimed at high-profile Israeli individuals employed in sensitive sectors. Researchers from Cybereason observed...
In early December 2021, a new ransomware actor started advertising its services on a Russian underground forum. They presented themselves...
Learn how to make your code run more efficiently in AWS Lambda, so you can save money and time! If...
Recently discovered malware loader Colibri leverages a trivial and efficient persistence mechanism to deploy Windows Vidar data stealer. Malwarebytes researchers...
Experts discovered a vulnerability, tracked as CVE-2022-22292, which can be exploited to compromise Android 9, 10, 11, and 12 devices....
Thanks to the Threat Intelligence team for their help with this article. Security researchers from Armorblox, a cybersecurity company specializing...
In December last year, the customer information of Cash App users was accessed by a former employee of Block, the...
Palo Alto Networks addressed a high-severity OpenSSL infinite loop vulnerability, tracked as CVE-2022-0778, that affects some of its firewall, VPN, and...
VMware fixed critical vulnerabilities in multiple products that could be exploited by remote attackers to execute arbitrary code. VMware has...
The U.S. government announced the disruption of the Cyclops Blink botnet operated by the Russia-linked Sandworm APT group. The U.S....
In our series wrap-up, we look into CVEs that affect critical manufacturing based on MITRE’s matrix. We also explore common...
We provide a guide to detecting Dirty Pipe, a Linux kernel vulnerability tracked as CVE-2022-0847. If you like the site, please...
Learn how the zero trust security model can be integrated into your DevOps lifecycle without implicating the agility or speed...
Ukraine’s technical security and intelligence service warns of threat actors targeting aimed at gaining access to users’ Telegram accounts. State...
Block disclosed a data breach related to the Cash App investing app and is notifying 8.2 million current and former...
Unfortunately scammers continue to focus on the invasion of Ukraine to make money. A flurry of bogus domains and scam...