A new malware campaign is spreading a previously undocumented backdoor named “Voldemort” to organizations worldwide, impersonating tax agencies from the…
As an industry and a society, we are finally making progress in protecting both our digital and physical identities. The…
Myth (noun). 1. an ancient story or set of stories, especially explaining the early history of a group of people…
An Iranian state-sponsored group often referred to as Iran’s Islamic Revolutionary Guard Corps (IRGC) is making headlines again this season…
A sophisticated cyberespionage campaign targeting East Asian countries has been uncovered, with the APT-C-60 group exploiting a zero-day vulnerability in…
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…
As of August 2024, Iran-based cyber actors continue to exploit U.S. and foreign organizations across multiple sectors. The primary sectors…
Durex India, a se$ual wellness brand that sells condoms and intimate products has fallen prey to a cyber attack leaking…
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…
Threat actors often target the popular code repository platform “GitHub” due to it’s wide use, and features that this platform…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…
Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…











