Russian hackers breached Microsoft, HPE corporate maliboxes
Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and...
Read more →Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and...
Read more →Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business...
Read more →ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood...
Read more →All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s...
Read more →Automated Emulation is an open-source Terraform template designed to create a customizable, automated breach and attack simulation lab. The solution...
Read more →Business executives are worried about accidental internal staff error (71%) almost as much as they are worried about external threats...
Read more →In this Help Net Security interview, Nate Warfield, Director of Threat Research and Intelligence at Eclypsium, outlines the crucial tasks...
Read more →Global attack attempts more than doubled in 2023, increasing 104%, according to Armis. Blind spots and critical vulnerabilities are worsening,...
Read more →VIVOTEK introduces its cloud-based security service VORTEX, emphasizing a smarter and easier approach. Now featuring the latest addition – VORTEX...
Read more →Stack Identity has unveiled the expansion of the Identity Access Risk Management Platform with identity threat detection and response (ITDR)...
Read more →Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears...
Read more →While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to...
Read more →