Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs
10
Sep
2024

Huntress launches Managed SIEM, eliminating the complexity of traditional SIEMs

Huntress announces the arrival of its new Managed SIEM solution, designed to serve small—to mid-sized enterprises and their MSP allies…

Addressing Election Security At 39th Annual National Conference
10
Sep
2024

Addressing Election Security At 39th Annual National Conference

During the Election Center 39th Annual National Conference held in Detroit on September 9, 2024, Jen Easterly, the Director of…

FBI Cryptocurrency Fraud Report
10
Sep
2024

Crypto Fraud Soars: FBI Reports Record Losses

The FBI’s Cryptocurrency Fraud Report for 2023, highlights a sharp rise in cyber-enabled financial crimes involving cryptocurrency. In 2023 alone,…

Spouse cheating
10
Sep
2024

Sextortion scams now use your “cheating” spouse’s name as a lure

A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data
10
Sep
2024

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since…

Tech stack uniformity has become a systemic vulnerability
10
Sep
2024

Tech stack uniformity has become a systemic vulnerability

Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability…

Specops brute force attacks
10
Sep
2024

How to defend against brute force and password spray attacks

From zero-day exploits to polymorphic malware, today’s organizations must protect themselves against increasingly sophisticated cyber threats. But while these types of complex attack vectors…

Predator Spyware Exploiting “one-click” & “zero-click” Flaws
10
Sep
2024

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced…

Forrester: IT budget growth pushed towards cross-functional teams
10
Sep
2024

Forrester: IT budget growth pushed towards cross-functional teams

IT leaders plan to spend more in 2025 compared to 2024, the Budget planning guides from analyst Forrester has reported….

Chinese hackers use new data theft malware in govt attacks
10
Sep
2024

Chinese hackers use new data theft malware in govt attacks

New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and…

WhatsApp View Once Privacy Flaw Exploited by Attackers in the Wild
10
Sep
2024

WhatsApp View Once Privacy Flaw Exploited by Attackers in the wild

WhatsApp’s “View Once” feature, designed to enhance privacy by allowing users to send photos and videos that disappear after being…

BBTok Abuses Legitimate Windows Utility Command Tool
10
Sep
2024

BBTok Abuses Legitimate Windows Utility Command Tool

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By leveraging trust…