Networkless and Cloud Based Attacks
How Organizations Are Being Compromised Without Touching the Endpoint Attackers are increasingly making use of networkless attack techniques that target cloud applications and digital identities, Read More
How Organizations Are Being Compromised Without Touching the Endpoint Attackers are increasingly making use of networkless attack techniques that target cloud applications and digital identities, Read More
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS Read More
FISA reauthorization heads to Biden’s desk after Senate passage Legislation to extend potent surveillance authorities won the precise number of votes it needed for passage Read More
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack Read More
Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity Read More
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach Read More
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that Read More
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell Read More
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH Read More
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime service called LabHost that has been used by Read More