Microsoft plans to kill off NTLM authentication in Windows 11
Microsoft announced earlier this week that the NTLM authentication protocol will be killed off in Windows 11 in the future. NTLM (short for...
Read more →Microsoft announced earlier this week that the NTLM authentication protocol will be killed off in Windows 11 in the future. NTLM (short for...
Read more →GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,...
Read more →Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding...
Read more →Microsoft Threat Intelligence has revealed that it has been tracking the active exploitation of a vulnerability in Atlassian Confluence software...
Read more →Coordinated Vulnerability Disclosure (CVD) or Vulnerability Disclosure Policies (VDP) for technology are key components of a security strategy that builds...
Read more →Cybercriminals are employing a novel code distribution technique dubbed ‘EtherHiding,’ which abuses Binance’s Smart Chain (BSC) contracts to hide malicious...
Read more →OWASP ZAP is a free and open-source web application security scanner. It is designed to be utilized by expert penetration...
Read more →A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831...
Read more →Amidst the cries for freedom from the war initiated by Hamas, innocent citizens of Israel are facing a new threat...
Read more →The US Securities and Exchange Commission (SEC) has launched a probe into the mass breach of Progress Software’s MOVEit file...
Read more →A new supply-chain attack, which was active throughout September 2023, has been discovered in which threat actors used Typosquatting and...
Read more →The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends...
Read more →