Networkless and Cloud Based Attacks
How Organizations Are Being Compromised Without Touching the Endpoint Attackers are increasingly making use of networkless attack techniques that target cloud applications and digital identities, Read More
How Organizations Are Being Compromised Without Touching the Endpoint Attackers are increasingly making use of networkless attack techniques that target cloud applications and digital identities, Read More
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack Read More
Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity Read More
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach Read More
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that Read More
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell Read More
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH Read More
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime service called LabHost that has been used by Read More
Supply chain attack sends shockwaves through open-source community Developers and security experts all over the world have been sent reeling over the past week by Read More
Sisense breach exposes customers to potential supply chain attack Sisense, a business analytics software company whose clients make up a who’s-who of the business world, Read More