Chinese APT40 group swifly leverages public PoC exploits
Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software,...
Read more →Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software,...
Read more →Microsoft is suffering cybersecurity failures due to systemic problems with strategic leadership. The world is witnessing an alarming trend of...
Read more →In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of...
Read more →TeamViewer, the company developing the popular remote access/control software with the same name, has finished the investigation into the breach...
Read more →A cryptographic weakness in the DoNex ransomware and its previous incarnations – Muse, fake LockBit 3.0, and DarkRace – has...
Read more →In this Help Net Security interview, Rob Greer, VP and GM of the Enterprise Security Group at Broadcom, discusses the...
Read more →The US celebrated Independence Day last week, providing many with a long weekend leading into patch week. With summer vacations...
Read more →Monocle is open-source tooling backed by a large language model (LLM) for performing natural language searches against compiled target binaries....
Read more →An estimated 4 million professionals are needed to fill the growing cybersecurity workforce gap, according to Fortinet. At the same...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: 4 key steps to building...
Read more →As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest...
Read more →Over the past six months, there has been a notable surge in Android financial threats – malware targeting victims’ mobile...
Read more →