Kickstarting Your SaaS Security Strategy & Program
Nov 08, 2023The Hacker NewsWebinar / SaaS Security SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on…
Nov 08, 2023The Hacker NewsWebinar / SaaS Security SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on…
The infamous NoEscape ransomware group has made headlines once more, with two fresh victims falling prey to their dark web portal – Avianor Group and…
North Korea-linked APT BlueNoroff used new macOS malware ObjCShellz Pierluigi Paganini November 08, 2023 The North Korea-linked APT BlueNoroff used a new strain of macOS malware…
Nov 08, 2023NewsroomCyber Threat / Endpoint Security Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different…
Just days after being temporarily delisted, Boeing, the leading aerospace giant and prominent defense contractor, has resurfaced on the LockBit ransomware group’s leak site, signaling…
Millions of Australians recently grappled with a severe communication crisis as Optus, the country’s second-largest telecommunications provider, was plunged into a widespread outage. While there…
Optus, the Australian counterpart of Singapore Telecommunications, faced a significant disruption on Wednesday, leading to widespread service outages affecting millions of customers. While some initially…
For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding…
Cybersecurity researchers link attackers to the Iranian-backed APT group “Agonizing Serpens,” which has upgraded its capabilities and uses various tools to bypass security measures. Hackers…
The Aqua Trivy open-source scanner now supports vulnerability scanning for Kubernetes components and Kubernetes Bill of Materials (KBOM) generation. Now, companies can better understand the…
OpenAI, the renowned artificial intelligence (AI) research lab, has allegedly become the target of a cyberattack by Anonymous Sudan, in collaboration with a partner known…
Four new zero-day vulnerabilities have been identified in Microsoft Exchange, which was associated with server-side request forgery and Remote Code Execution. These vulnerabilities haven’t been…