A cyberattack halted operations at Varta production plants
A cyberattack halted operations at Varta production plants Pierluigi Paganini February 15, 2024 On February 12, 2023, a cyber attack halted operations at five production…
A cyberattack halted operations at Varta production plants Pierluigi Paganini February 15, 2024 On February 12, 2023, a cyber attack halted operations at five production…
The U.S. State Department is offering rewards of up to $10 million for information that could lead to the identification or location of ALPHV/Blackcat ransomware…
By Chris Leach, Board Advisor for Judy Security The new year is just around the corner. We have had a great Thanksgiving meal and soon…
By Charlie Regan, CEO, Nerds on Site As more and more industries and businesses turn to digital technologies in order to power their operations, cyber-attacks…
The new TicTacToe Dropper has been observed dropping additional threats onto Windows devices, including AgentTesla and LokiBot. Fortinet’s FortiGuard Labs Threat Research Team has identified…
A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again underscoring the challenge of securing software supply…
The FBI took down a botnet of small office/home office (SOHO) routers used by Russia’s Main Intelligence Directorate of the General Staff (GRU) in spearphishing…
Today, API security pros Salt Security have announced that the Salt Security API Protection Platform is now available for purchase in the CrowdStrike Marketplace. Salt Security…
An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to specific targets. These attacks may…
February 15, 2024 – Nexo, the leading institution for digital assets, announced a partnership with Sift, the Leader in Digital Trust & Safety. By working…
The U.S. Securities and Exchange Commission (SEC) has made a significant announcement regarding the security of its X account, affirming the implementation of 2-factor authentication…
15 Feb Securing Supply Chains with Open XDR How Open XDR provides an effective and comprehensive means of combating threats – Aimei Wei, Chief Technical…