MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!
04
Oct
2024

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a…

October 2024 Patch Tuesday forecast: Recall can be recalled
04
Oct
2024

October 2024 Patch Tuesday forecast: Recall can be recalled

October arrived, and Microsoft started the month by announcing the release of Windows 11 24H2. The preview versions of this…

Best practices for implementing threat exposure management, reducing cyber risk exposure
04
Oct
2024

Best practices for implementing threat exposure management, reducing cyber risk exposure

In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in…

Cybercriminals capitalize on poorly configured cloud environments
04
Oct
2024

Cybercriminals capitalize on poorly configured cloud environments

Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are…

New infosec products of the week: October 4, 2024
04
Oct
2024

New infosec products of the week: October 4, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Balbix, Halcyon, Metomic, Red Sift,…

Perfctl Malware
04
Oct
2024

New Perfctl Malware Attacking Millions of Linux Servers

A sophisticated and elusive malware known as “Perfctl,” has been discovered targeting millions of Linux servers worldwide. Researchers at Aqua…

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime
04
Oct
2024

From Detection to Defense: Evolving Risk Management Amid Rising Cybercrime

The cyber threat landscape continues to evolve rapidly. The year has not ended yet but we have witnessed an increasing…

DDoS
04
Oct
2024

Recently patched CUPS flaw can be used to amplify DDoS attacks

A recently disclosed vulnerability in the Common Unix Printing System (CUPS) open-source printing system can be exploited by threat actors…

Dutch police breached by a state actor
04
Oct
2024

Dutch police breached by a state actor

Dutch police breached by a state actor Pierluigi Paganini October 03, 2024 The Dutch government blames a “state actor” for…

No deadlines set for NSW agencies to resolve heightened cyber risks
04
Oct
2024

No deadlines set for NSW agencies to resolve heightened cyber risks – Security

NSW government agencies with cyber risks outside acceptable levels have not set deadlines to rein them in, according to an…

Rival browsers allege Microsoft's practices on Edge unfair
04
Oct
2024

Rival browsers allege Microsoft’s practices on Edge unfair – Software

Microsoft gives its Edge web browser an unfair advantage and EU antitrust regulators should subject it to tough EU tech…

Rising IT talent costs shadow Sweden’s skills shortage and market reforms
03
Oct
2024

Rising IT talent costs shadow Sweden’s skills shortage and market reforms

Increased competition for IT talent in Sweden has produced a sharp rise in salaries as small-to-medium sized enterprises (SMEs) battle…