Security researchers hacked a Tesla Modem and collected awards of $722,500 on the first day of Pwn2Own Automotive 2024 for…
Recently, QuoIntelligence’s research team unearthed a previously undetected variant of the notorious WIREFIRE web shell, a Python-based implant targeting compromised…
An infinite variety of attack methods require customizable solutions. By Sean Newman, VP/Product Management, Corero Sun Tzu was an exceptional…
Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…
A case study on how a $10B global media firm significantly improved SaaS security posture Media firms in the business…
The report outlines that Artificial Intelligence (AI), currently utilized by cybercriminals, is lowering entry barriers for less experienced threat actors,…
Proof-of-concept (PoC) exploit code for a critical vulnerability (CVE-2024-0204) in Fortra’s GoAnywhere MFT solution has been made public, sparking fears…
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack…
Cardiff University has deployed 90 Lenovo ThinkSystem servers, with Logicalis technology, to support high-performance computing (HPC) research. The university’s Advanced…
It was previously reported that Ivanti Connect Secure was vulnerable to an authentication bypass (CVE-2023-46805) and a command injection vulnerability…
Taking The Worry Out of Retiring Assets By Roger Gagnon, President & CEO, Extreme Protocol Solutions Organizations across the globe…
Then Hamas attacked Israel. Since then, NSO has been in a position to tangibly demonstrate the value of tools like…











