Jan 09, 2025Ravie LakshmananCybersecurity / Malware Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for…
The Australian Government has shared its insights and developments regarding the Commonwealth’s cybersecurity measures. The Commonwealth Cybersecurity Posture 2024 provides…
The Green Bay Packers, Inc. has confirmed that its online merchandise store was hacked, leading to the theft of credit…
Then, between Christmas Eve and New Year’s, came a new deluge of swattings. They hit close to a hundred politicians…
A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals…
Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security flaw…
SOC Scalability: How AI Supports Growth Without Overloading Analysts Pierluigi Paganini January 09, 2025 Scaling up a security operations center…
Malicious packages “solanacore,” “solana login,” and “walletcore-gen” on npmjs target Solana developers with Windows trojans and malware for keylogging and…
Synology releases ActiveProtect, a new line of data protection appliances designed to provide enterprises a unified backup solution with simplicity,…
For years, cyber risk was relegated to the world of information technology (IT), managed by security and engineering teams as…
As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it…
A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity…