-
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
Source: Unit 42 Published on 2024-04-13 By Unit 42
-
Muddled Libra’s Evolution to the Cloud
Source: Unit 42 Published on 2024-04-10 By Margaret Zimmermann
-
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
Source: Unit 42 Published on 2024-04-09 By Beliz Kaleli, Fang Liu, Peng Peng, Alex Starov, Joey Allen and Stefan Springer
-
Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094)
Source: Unit 42 Published on 2024-03-31 By Unit 42
-
Exposing a New BOLA Vulnerability in Grafana
Source: Unit 42 Published on 2024-03-27 By Ravid Mazon and Jay Chen
-
Microsoft introduces passkeys for consumer accounts
Source: Blog from Microsoft Security Published on 2024-05-02 By Vasu Jakkal and Joy Chik
-
Microsoft named overall leader in KuppingerCole Leadership Compass for ITDR
Source: Blog from Microsoft Security Published on 2024-05-02 By Alex Weinert and Ramya Chitrakar
-
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
Source: Blog from Microsoft Security Published on 2024-05-02 By Microsoft Threat Intelligence
-
Investigating industrial control systems using Microsoft’s ICSpector open-source framework
Source: Blog from Microsoft Security Published on 2024-04-26 By Maayan Shaul
-
5 ways a CNAPP can strengthen your multicloud security environment
Source: Blog from Microsoft Security Published on 2024-04-25 By Vlad Korsunsky
-
University System of Georgia: 800K exposed in 2023 MOVEit attack
Source: BleepingComputer Published on 2024-05-09 By Bill Toulas
-
Ascension healthcare takes systems offline after cyberattack
Source: BleepingComputer Published on 2024-05-09 By Sergiu Gatlan
-
Stack Overflow suspends user for editing posts in OpenAI protest
Source: BleepingComputer Published on 2024-05-09 By Mayank Parmar
-
New BIG-IP Next Central Manager bugs allow device takeover
Source: BleepingComputer Published on 2024-05-09 By Sergiu Gatlan
-
FBI warns of gift card fraud ring targeting retail companies
Source: BleepingComputer Published on 2024-05-09 By Sergiu Gatlan
-
State of ransomware in 2024
Source: Securelist Published on 2024-05-08 By Kaspersky
-
Exploits and vulnerabilities in Q1 2024
Source: Securelist Published on 2024-05-07 By Alexander Kolesnikov, Vitaly Morgunov
-
Financial cyberthreats in 2023
Source: Securelist Published on 2024-05-06 By Kaspersky
-
Managed Detection and Response in 2023
Source: Securelist Published on 2024-04-30 By Kaspersky Security Services
-
Assessing the Y, and How, of the XZ Utils incident
Source: Securelist Published on 2024-04-24 By GReAT
-
A SaaS Security Challenge: Getting Permissions All in One Place
Source: The Hacker News Published on 2024-05-08
-
New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data
Source: The Hacker News Published on 2024-05-08
-
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Source: The Hacker News Published on 2024-05-08
-
The Fundamentals of Cloud Security Stress Testing
Source: The Hacker News Published on 2024-05-08
-
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Source: The Hacker News Published on 2024-05-08
-
From IcedID to Dagon Locker Ransomware in 29 Days
Source: The DFIR Report Published on 2024-04-29 By editor
-
From OneNote to RansomNote: An Ice Cold Intrusion
Source: The DFIR Report Published on 2024-04-01 By editor
-
Threat Brief: WordPress Exploit Leads to Godzilla Web Shell, Discovery & New CVE
Source: The DFIR Report Published on 2024-03-04 By editor
-
SEO Poisoning to Domain Control: The Gootloader Saga Continues
Source: The DFIR Report Published on 2024-02-26 By editor
-
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Source: The DFIR Report Published on 2024-01-29 By editor