Fancy Bear Uses Nuke Threat Lure to Exploit 1-Click Bug | Threatpost
Advanced persistent threat group Fancy Bear is behind a phishing campaign that uses the specter of nuclear war to exploit a known one-click Microsoft flaw. Read More
Advanced persistent threat group Fancy Bear is behind a phishing campaign that uses the specter of nuclear war to exploit a known one-click Microsoft flaw. Read More
Hackers are increasingly capitalizing on our volatile world—there was an increase in coronavirus-related phishing attacks in the pandemic’s early days as well as threats associated Read More
We have read enough and more news in recent times on the surge in cyberattacks. It is crystal clear that attackers are not leaving out Read More
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security Read More
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need Read More
The Open Web Application Security Project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after 4 years. Read More
Dealing with risks presented by internal users requires a different approach than those from external threats. This shouldn’t be news to anyone, but it does Read More
Recently reported VMware bugs are being used by hackers who are focused on using them to deliver Mirai denial-of-service malware and exploit the Log4Shell vulnerability. Read More
In this podcast we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more.
Credit: Red Canary Wormable malware dubbed Raspberry Robin has been active since last September and is wriggling its way through USB drives onto Windows machines Read More