Nov 22, 2024Ravie LakshmananCyber Attack / Malware
The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called...
Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This...
Nov 22, 2024Ravie LakshmananCyber Espionage / Malware
Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations...
Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams,...
Nov 22, 2024Ravie LakshmananArtificial Intelligence / Malware
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated...
Nov 21, 2024Ravie LakshmananCyber Espionage / Malware
The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux...
Nov 21, 2024Ravie LakshmananVulnerability / Cyber Attack
As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of...
As a relatively new security category, many security operators and executives I've met have asked us "What are these Automated Security Validation (ASV)...
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain...