Mandiant Almost Gone header
02
Aug
2023

Why Every Security Practitioner Should Attend mWISE

What’s in store for mWISE 2023? 80+ curated sessions. 90+ hand-picked speakers. 7 session tracks. All the hottest topics in…

Microsoft and Samsung launch Advanced Mobile Security Solution
02
Aug
2023

Juice Jacking Cyber Attack: The Hidden Threat at Public Charging Stations

In an increasingly connected world, our mobile devices have become essential tools for communication, work, and entertainment. However, the constant…

Belgian researchers build energy-efficient AI frameworks
02
Aug
2023

The rise of Generative AI in software development

Generative AI and large language models (LLMs) aren’t completely new technologies, but the world reached a greater awareness of their…

Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach
02
Aug
2023

Rolls Royce targeted in a sophisticated Cyber Attack with potential Data Breach

Rolls-Royce, the renowned British manufacturing giant, has fallen victim to a sophisticated cyber attack resulting in potential data theft related…

02
Aug
2023

Attackers can turn AWS SSM agents into remote access trojans

Mitiga researchers have documented a new post-exploitation technique attackers can use to gain persistent remote access to AWS Elastic Compute…

Remote Access Trojan
02
Aug
2023

Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access Trojan

Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS)…

Ivanti MDM users told to patch against two dangerous flaws
02
Aug
2023

Ivanti MDM users told to patch against two dangerous flaws

Users of Ivanti’s Endpoint Manager Mobile (EPMM) mobile device management (MDM) platform have been warned to act now to patch…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
02
Aug
2023

Google AMP Abused in Phishing Attacks Aimed at Enterprise Users

Threat actors have been observed abusing Google Accelerated Mobile Pages (AMP) in phishing campaigns, as a new tactic to evade…

BloodHound: Open-source Pentesting Tool to Map Active Directory & Azure Attack Path
02
Aug
2023

Open-source Pentesting Tool Active Directory

SpecterOps announced BloodHound Community Edition (CE), which will be available in early access on August 8, 2023! SpecterOps is a…

7 Benefits of Implementing ZTNA
02
Aug
2023

7 Benefits of Implementing ZTNA

(Zero Trust Network Access) By Howie Robleza, Freelance Writer, Avigilon One of the most significant worries for business leaders in…

New Collide+Power Exploit Let Attacker Steal Sensitive Data
02
Aug
2023

New Collide+Power Exploit Let Attacker Steal Sensitive Data

The build and shared components on the CPUs are exploited by a method called Collide+Power. This attack vector does not…

Biometric as a Service (BaaS) – An Opinion Piece
02
Aug
2023

Biometric as a Service (BaaS) – An Opinion Piece

By Mohit Shrivastava, Chief Analyst ICT, Future Market Insights Biometric as a service (BaaS) works best as a striking alternative…