Stories from the SOC – The case for human response actions
[ This article was originally published here ] Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and…
[ This article was originally published here ] Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and…
The massive popularity of OpenAI’s chatbot ChatGPT has not gone unnoticed by cyber criminals: they are exploiting the public’s eagerness to experiment with it to…
Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine products since January 20,…
Dole Food Company, one of the world’ largest producers and distributors of fresh fruit and vegetables, has announced that it is dealing with a ransomware attack that…
CSF 2.0 blueprint offered up for public review ANALYSIS The US National Institute of Standards and Technology (NIST) is planning significant changes to its Cybersecurity…
Late last year, eQualitie began crowdfunding to source batteries for some smaller ISPs in Ukraine. The money they raised helped them buy 172 batteries from…
A new variant of ransomware, named Nevada Group by some security researchers reportedly targeted about 5000 victims in US and Europe and this took place…
Lacework has released composite alerts on the Lacework Polygraph Data Platform, to help customers detect compromised credentials, cloud ransomware, and cryptomining that would otherwise go…
Feb 23, 2023Ravie LakshmananCyber Threat / Data Security A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely…
Santander UK is using technology from Salesforce to offer its UK small and medium-sized enterprise (SME) customers advice on growing their export businesses, through a…
Salt Security has increased signed partners and deal registrations as global enterprises accelerate adoption of dedicated API security to protect their critical digital innovation initiatives.…
Cybercriminals can breach the security of your home WiFi and potentially cause you significant harm. Your home network may be used by malicious cyber actors…