Jan 15, 2024NewsroomOperational Technology / Network Security Multiple security vulnerabilities have been disclosed in Bosch BCC100 thermostats and Rexroth NXA015S-36V-B…
In a developing story that underscores the persistent challenges of cybersecurity in the corporate world, an alleged new McDonald’s data…
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less…
In the ever-evolving landscape of cyber threats, Medusa Ransomware has taken a bold step by launching a dedicated blog to…
Tura Scandinavia AB allegedly finds itself targeted by the LockBit ransomware group, marking another episode in the company’s history of…
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has…
As organizations increasingly migrate their operations to public cloud environments, the need for robust security measures has never been more…
For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written)…
Jan 15, 2024NewsroomServer Security / Cyber Attack The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS)…
Several prominent organizations in Lithuania, including Compensa Vienna Insurance Group, If Insurance, Lithuanian Roads Association, AD REM, INIT, and Balticum,…
Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool…
Juniper Networks has issued its first three security updates for 2024, including a critical bug in its J-Web network management…











