China’s Mustang Panda Linked to SmugX Attacks on European Governments
A Chinese threat group has adopted a sneak HTML technique long-used by its counterparts to target European policy-makers, in a campaign aimed at spreading the Read More
A Chinese threat group has adopted a sneak HTML technique long-used by its counterparts to target European policy-makers, in a campaign aimed at spreading the Read More
Cloud misconfigurations are a leading cause of breaches that lead to data loss for the enterprise, especially with the continued shift to cloud and multicloud Read More
There has always been a tradeoff in IT between shipping new features and functionality versus paying down technical debt, which includes things like reliability, performance, Read More
A hacking crew with a history of blending politics and criminal activities claimed on Saturday to have “targeted various satellite receivers and industrial control systems Read More
Threat actors are exploiting vulnerable secure shell protocol (SSH) servers to launch Docker services that take advantage of an emerging and lucrative attack vector that Read More
Fortanix is bringing hardware security technology to database search with Confidential Data Search, with the goal to help organizations process highly sensitive data in databases. Read More
The cyber security operation center (SOC) model’s focus has shifted to extended detection and response (XDR). Architected correctly, XDR puts less pressure and cost on Read More
Researchers have written exploit code for a critical remote code execution (RCE) vulnerability in Fortinet’s FortiGate SSL VPNs that the vendor disclosed and patched in Read More
Russian satellite Internet provider Dozor-Teleport was knocked offline in the early hours of June 29, dealing a communications blow to the company’s customers, which according Read More
Israel earlier this year aided the United Arab Emirates (UAE) in helping repel a major distributed denial-of-service (DDoS) attack. Speaking at last week’s Cyber Week Read More