APT-C-60 Exploits WPS Office Zero-Day
A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in WPS Office to deploy the…
A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in WPS Office to deploy the…
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began with basic asset management practices…
As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors targeted are education, finance, healthcare,…
Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking sensitive details of its customers.…
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server…
Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform offers. Cybersecurity analysts at Gen…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to figure out the best way…
Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to infiltrate Windows systems, posing significant…
I was thrilled to catch up with Blumira during Black Hat USA 2024. When it comes to resource-constrained businesses, traditional security information and event management…
Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that…
The Communication Challenge in Cybersecurity The vulnerability management process involves various stakeholders, each with their own expertise and communication styles. Security teams focus on identifying…
The City of Columbus, Ohio, has filed a lawsuit against security researcher David Leroy Ross, aka Connor Goodwolf, accusing him of illegally downloading and disseminating…