Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The...
Read more →As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The...
Read more →Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people...
Read more →An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season...
Read more →A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in...
Read more →The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began...
Read more →As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors...
Read more →Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking...
Read more →Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence...
Read more →Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform...
Read more →It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to...
Read more →Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to...
Read more →I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional...
Read more →