Making Progress and Losing Ground
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many…
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The good news is that many…
Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people or about natural events and…
An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season as Meta disclosed that the…
A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in WPS Office to deploy the…
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began with basic asset management practices…
As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors targeted are education, finance, healthcare,…
Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking sensitive details of its customers.…
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server…
Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform offers. Cybersecurity analysts at Gen…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way…
Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to infiltrate Windows systems, posing significant…
I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management…