No menu items!
No menu items!
More

    News

    CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

    Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server...

    Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

    Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners...

    Urgent: GitLab Releases Patch for Critical Vulnerabilities

    Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take...

    Why Attack Simulation is Key to Avoiding a KO

    Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong shield. Sadly, this...

    From Data Leaks to Multi-Extortion

    The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on...

    Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

    Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities...

    29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

    Jan 13, 2024NewsroomCryptojacking / Cloud Security A 29-year-old Ukrainian national has been arrested in connection with running a "sophisticated cryptojacking scheme," netting them over...

    Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches

    Jan 13, 2024NewsroomVulnerability / Network Security Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability in its SRX Series...

    New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks

    Jan 14, 2024NewsroomCyber Attack / Vulnerability The cyber attacks targeting the energy sector in Denmark last year may not have had the involvement of...

    Latest articles

    spot_imgspot_img