The Problem
The “2024 Attack Intelligence Report” from the staff at Rapid7 is a well-researched, well-written report that is worthy of careful study....
Jul 10, 2024NewsroomCybersecurity / Phishing Attack
Google on Wednesday announced that it's making available passkeys for high-risk users to enroll in its Advanced Protection...
Jul 10, 2024NewsroomOnline Scam / Blockchain
Cryptocurrency analysts have shed light on an online marketplace called HuiOne Guarantee that's widely used by cybercriminals in...
Jul 10, 2024NewsroomEndpoint Security / Threat Intelligence
The sophisticated malware known as ViperSoftX has been observed being distributed as eBooks over torrents.
"A notable aspect...
Jul 10, 2024NewsroomVulnerability / Network Security
Select versions of the OpenSSH secure networking suite are susceptible to a new vulnerability that can trigger remote...
Jul 09, 2024Newsroom
Military personnel from Middle East countries are the target of an ongoing surveillanceware operation that delivers an Android data-gathering tool called...
Jul 09, 2024NewsroomVulnerability / Network Security
Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called BlastRADIUS that could be...
Jul 09, 2024NewsroomCI/CD Security / Server Security
Cybersecurity researchers have found that it's possible for attackers to weaponize improperly configured Jenkins Script Console instances...
Clear Web vs. Deep Web vs. Dark Web
Threat intelligence professionals divide the internet into three main components:
Clear Web - Web assets that can...