Why Now? The Rise of Attack Surface Management
The term "attack surface management" (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years....
The term "attack surface management" (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years....
"Dozens" of organizations across the world have been targeted as part of a broad business email compromise (BEC) campaign that...
It might come as a surprise, but secrets management has become the elephant in the AppSec room. While security vulnerabilities...
The term "attack surface management" (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years....
The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with masterminding the 2014 digital heist of...
Believe it or not, your attack surface is expanding faster than you realize. How? APIs, of course! More formally known...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Fortinet on Monday disclosed that a newly patched critical flaw impacting FortiOS and FortiProxy may have been "exploited in a...
The term "attack surface management" (ASM) went from unknown to ubiquitous in the cybersecurity space over the past few years....
Fortinet says a critical FortiOS SSL VPN vulnerability that was patched last week "may have been exploited" in attacks impacting...
Horizon3 security researchers have released proof-of-concept (PoC) exploit code for a remote code execution (RCE) bug in the MOVEit Transfer...
The Swiss government has disclosed that a recent ransomware attack on an IT supplier might have impacted its data, while...
Zacks Investment Research (Zacks) has reportedly suffered an older, previously undisclosed data breach impacting 8.8 million customers, with the database...
CISA and Partners Release Joint Guide to Securing Remote Access Software Today, CISA, Federal Bureau of Investigation (FBI), the National...
CISA and FBI Release #StopRansomware: CL0P Ransomware Gang Exploits MOVEit Vulnerability CISA and FBI released a joint Cybersecurity Advisory (CSA)...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on June 6, 2023. These...