Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late...
May 31, 2024NewsroomThreat Detection / Endpoint Security
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across...
May 31, 2024NewsroomCyber Attack / Credential Harvesting
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks...
May 30, 2024NewsroomLinux / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to...
May 30, 2024NewsroomCyber Attack / Malware
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat...
May 30, 2024NewsroomCyber Espionage / Threat Intelligence
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning various...
May 30, 2024NewsroomWordPress / Website Security
Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively exploited by threat...