Australian Cybersecurity: Rising Stress Among Professionals
A recent survey conducted by ISACA has highlighted the growing stress levels faced by cybersecurity professionals in Australia. According to the report, 64% of respondents…
A recent survey conducted by ISACA has highlighted the growing stress levels faced by cybersecurity professionals in Australia. According to the report, 64% of respondents…
Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of domains a Russian hacking group linked to the Federal Security Service…
Google recently addressed a flaw within cellular modem vulnerabilities that can pose risk to smartphone users. The cellular baseband is responsible for handling all cellular…
Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits over 20,000 types of server…
In a historic move that underscores the escalating battle against cybercrime, Microsoft has publicly acknowledged its role in launching a cyber offensive against a Russian-funded…
MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a custom-built C# LDAP parser designed…
October arrived, and Microsoft started the month by announcing the release of Windows 11 24H2. The preview versions of this release have been in the…
In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in modern cybersecurity strategies. As traditional…
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing off-the-shelf tools Offensive security…
Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift, SAFE Security, Veeam Software, and…
A sophisticated and elusive malware known as “Perfctl,” has been discovered targeting millions of Linux servers worldwide. Researchers at Aqua Nautilus have shed light on…
The cyber threat landscape continues to evolve rapidly. The year has not ended yet but we have witnessed an increasing number of existing and new…