CISA, FBI, and NSA published the list of 12 most exploited vulnerabilities of 2022Security Affairs
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities of 2022. CISA, the NSA,…
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities of 2022. CISA, the NSA,…
Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed at the end of the…
Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications migrate to the cloud, ensuring…
Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario. BlueCharlie is a Russia-linked threat…
The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and defacement attacks through open-source utilities…
Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a high CVSS score of 9.8.…
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an ever-expanding range of cybersecurity threats.…
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar, SpecterOps, Synopsys, Traceable AI, and…
Researchers have found a new phishing tactic that uses Google Accelerated Mobile Pages (AMP) URLs to look trustworthy Researchers have found a new phishing tactic…
Ransomware gangs are also starting to focus on exploiting zero-days for initial access. Ransomware attacks have shown no signs of slowing down in 2023. A…
We’ve made a handy flow chart to help IT and security folk decide if they’re ready to go on vacation. Are you ready for a…