Continuous Threat Exposure Management (CTEM)
04
Oct
2024

How to Get Going with CTEM When You Don’t Know Where to Start

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks…

Non-traditional routes will increase tech diversity, says Tech Returners
04
Oct
2024

Non-traditional routes will increase tech diversity, says Tech Returners

Women in tech claim that diversity in the sector will improve if businesses focus on creating non-traditional routes into tech…

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam
04
Oct
2024

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam

A new ransomware campaign targeting individuals and organizations in the UK and the US has been identified. The attack, known…

Microsoft and DOJ seized the attack infrastructure used by Russia-linked Callisto Group
04
Oct
2024

Microsoft and DOJ seized the attack infrastructure used by Russia-linked Callisto Group

Microsoft and DOJ seized the attack infrastructure used by Russia-linked Callisto Group Pierluigi Paganini October 04, 2024 Microsoft and the…

Australian Cybersecurity: Rising Stress Among Professionals
04
Oct
2024

Australian Cybersecurity: Rising Stress Among Professionals

A recent survey conducted by ISACA has highlighted the growing stress levels faced by cybersecurity professionals in Australia. According to…

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group
04
Oct
2024

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of domains a Russian hacking group linked…

Pixel Phones Tackle Cellular Modem Vulnerabilities
04
Oct
2024

Pixel Phones Tackle Cellular Modem Vulnerabilities

Google recently addressed a flaw within cellular modem vulnerabilities that can pose risk to smartphone users. The cellular baseband is…

Linux Malware perfctl Attacking Millions of Linux Servers
04
Oct
2024

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits…

Naveen Goud
04
Oct
2024

Microsoft Takes Unprecedented Action Against Cyber Threat Actor Star Blizzard

In a historic move that underscores the escalating battle against cybercrime, Microsoft has publicly acknowledged its role in launching a…

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!
04
Oct
2024

MaLDAPtive: Open-source framework for LDAP SearchFilter parsing, obfuscation, and more!

MaLDAPtive is an open-source framework for LDAP SearchFilter parsing, obfuscation, deobfuscation, and detection. At its core, the project features a…

October 2024 Patch Tuesday forecast: Recall can be recalled
04
Oct
2024

October 2024 Patch Tuesday forecast: Recall can be recalled

October arrived, and Microsoft started the month by announcing the release of Windows 11 24H2. The preview versions of this…

Best practices for implementing threat exposure management, reducing cyber risk exposure
04
Oct
2024

Best practices for implementing threat exposure management, reducing cyber risk exposure

In this Help Net Security interview, Sanaz Yashar, CEO at Zafran, discusses the role of threat exposure management (TEM) in…