A steam locomotive from 1993 broke my yarn test
So the story begins with a pair programming session I had with my colleague, which I desperately needed because my […]
A steam locomotive from 1993 broke my yarn test Read More »
So the story begins with a pair programming session I had with my colleague, which I desperately needed because my […]
A steam locomotive from 1993 broke my yarn test Read More »
Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance
Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers Read More »
Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers Read More »
When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration
How SSL Misconfigurations Impact Your Attack Surface Read More »
The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites Read More »
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth Read More »
Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners. Cloud
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign Read More »
On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted
Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform Read More »
A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via
Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing Read More »