Cloud databases: Base jumping for the bigger picture
The way organisations store, manage and analyse data will always be a challenging issue given the constant assault of data on corporate IT systems. It’s…
The way organisations store, manage and analyse data will always be a challenging issue given the constant assault of data on corporate IT systems. It’s…
Casper Network has halted all operations due to a cyberattack on its blockchain platform. The Casper Network security breach was detected by the IT team,…
Belarus-linked APT Ghostwriter targeted Ukraine with PicassoLoader malware Pierluigi Paganini July 29, 2024 Belarus-linked APT group GhostWriter targeted Ukrainian organizations with a malware family known…
Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool for mining Monero cryptocurrency. Selenium…
A critical vulnerability in the Remote Authentication Dial-In User Service (RADIUS) protocol has been disclosed, affecting multiple Cisco products. The vulnerability, CVE-2024-3596, allows an on-path…
A couple weeks ago, an IT outage hit Microsoft Windows 10 and 11 servers shortly after CrowdStrike released a Falcon Sensors software update. Rather than…
This article includes excerpts from recent reports we covered, providing statistics and insights into the levels of stress and burnout experienced by cybersecurity professionals. Most…
Jul 29, 2024NewsroomCybersecurity / Cyber Espionage The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit…
Fake Falcon crash reporter installer used to target German Crowdstrike users Pierluigi Paganini July 29, 2024 CrowdStrike warns about a new threat actor targeting German…
In the world of cybersecurity, software updates are a double-edged sword. On one hand, they are crucial for patching vulnerabilities, enhancing features, and improving overall…
Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection mechanisms. Traditional cloud threat detection…
Cirrus is an open-source Python-based tool designed to streamline Google Cloud forensic evidence collection. It can streamline environment access and evidence collection in investigations involving…