What’s the Difference Between CSPM & SSPM?
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding, both security solutions focus on…
Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) are frequently confused. The similarity of the acronyms notwithstanding, both security solutions focus on…
Apr 17, 2023Ravie Lakshmanan A new strain of malware developed by threat actors likely affiliated with the FIN7 cybercrime group has been put to use…
Apr 17, 2023The Hacker NewsCybersecurity / Webinar The Deep, Dark Web – The Underground – is a haven for cybercriminals, teeming with tools and resources…
Apr 17, 2023Ravie LakshmananCyber Threat / Cloud Security A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming…
Apr 17, 2023Ravie LakshmananRansomware / Cyber Attack Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to…
Apr 17, 2023Ravie LakshmananBrowser Security / Cyber Threat A novel credential-stealing malware called Zaraza bot is being offered for sale on Telegram while also using…
Apr 15, 2023Ravie LakshmananZero-Day / Browser Security Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser,…
Apr 14, 2023Ravie LakshmananUnited States The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign ministries…
Apr 14, 2023Ravie LakshmananData Breach / Cyber Security Open source media player software provider Kodi has confirmed a data breach after threat actors stole the…
Apr 14, 2023The Hacker NewsVirtual CISO / Cybersecurity In today’s fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats.…
Apr 14, 2023Ravie LakshmananMobile Security / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities…
Apr 13, 2023Ravie LakshmananVulnerability Management Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing greater transparency measures…