Top 10 Cloud Security Mitigation Strategies
11
Mar
2024

Top 10 Cloud Security Mitigation Strategies

NSA and CISA jointly released “Top 10 Cloud Security Mitigation Strategies” to advise cloud users on critical security practices for…

Dropbox Emails Abused in New Phishing, Malspam Scam to Steal SaaS Logins
11
Mar
2024

Dropbox Abused in New Phishing, Malspam Scam to Steal SaaS Logins

Beware of phishing and malspam scams targeting your Software-as-a-Service (SaaS) logins! Cybercriminals are using fake Dropbox emails to steal login…

A better way to manage hybrid or multicloud deployments
11
Mar
2024

A better way to manage hybrid or multicloud deployments

With hybrid cloud no longer merely a stop along the way to full-fledged public cloud, tackling management complexity is essential….

Lindsay Municipal Hospital Cyberattack Claimed By BianLian
11
Mar
2024

Lindsay Municipal Hospital Cyberattack Claimed By BianLian

The Lindsay Municipal Hospital cyberattack has been claimed by the BianLian ransomware group. This nefarious organization, known for its disruptive…

NSP Top Ten Cloud Security Practices
11
Mar
2024

Vulnerability in 16.5K+ VMware ESXi Let Attackers Execute Code

VMware’s ESXi, Workstation, and Fusion products could allow attackers to execute malicious code on affected systems. Impacted VMware Products These…

CloudGrappler: Open-source tool detects activity in cloud environments
11
Mar
2024

CloudGrappler: Open-source tool detects activity in cloud environments

CloudGrappler is an open-source tool designed to assist security teams in identifying threat actors within their AWS and Azure environments….

Magnet Goblin Hacker Group
11
Mar
2024

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities…

Google Is Getting Thousands of Deepfake Porn Complaints
11
Mar
2024

Google Is Getting Thousands of Deepfake Porn Complaints

Each method is weaponized—almost always against women—to degrade, harass, or cause shame, among other harms. Julie Inman Grant, Australia’s e-safety…

10 free cybersecurity guides you might have missed
11
Mar
2024

10 free cybersecurity guides you might have missed

This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific…

Progress Software OpenEdge Vulnerability
11
Mar
2024

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently…

Cyberattacks On Baltic States: Russian Influence And Disruption
11
Mar
2024

Cyberattacks On Baltic States: Russian Influence And Disruption

A recent security report from Lithuania highlights a concerning increase in Russian influence operations targeting the Baltic States and Poland….

Malware Families Adapting To COM Hijacking Technique For Persistence
11
Mar
2024

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding…