Basic cyber hygiene protects against 99% of cyber attacks
Basic cyber hygiene protects against 99% of cyber attacks. Seems easy, but that implies establishing a proper cybersecurity program, that includes people, processes and technology.
Read moreBasic cyber hygiene protects against 99% of cyber attacks. Seems easy, but that implies establishing a proper cybersecurity program, that includes people, processes and technology.
Read morePro CISO’s Threat Intelligence service identifies collections of Bitwarden password manager credentials on the Darkweb
Read moreHow the CL0P ransomware group exploits a zero day vulnerability of the MOVEit file transfer product, to attack their victims, encrypt their data and demand a ransom to decrypt the files.
Read more"Stealer" malware is the new silent threat. Targeting anyone, both individuals and organizations, with the objective to harvest credentials and sensitive information from user devices and sell them on the Darkweb
Read moreWhy did cybersecurity become a business risk? Because of ransomware ? Or maybe, because of something we've all heard about called: the Digital Transformation (DX) ?
Read moreCISA) is releasing this Cybersecurity Advisory (CSA) to warn organizations that malicious cyber actors, likely advanced persistent threat (APT) actors, are exploiting CVE-2022-22954 and CVE-2022-22960 separately and in combination
Read moreThe Five Eyes (FVEY) intelligence alliance warns managed service providers (MSPs) and their customers around increasing supply chain attacks.
Read moreThe new juvenile data extortion group, LAPSUS$, has taken big organizations by surprise with their old-fashioned social engineering attacks
Read moreA new vulnerability in the Spring Framework for Java Development Kit (JDK) version 9.0 or later. Exposes millions of systems to compromise, similarly to the Log4j vulnerability,
Read moreThe Microsoft Defender for IoT research team has discovered the method through which MikroTik devices are used in Trickbot’s C2 infrastructure.
Read moreHive Systems updates its Password Table, considering the new processing power available in 2022
Read moreTo preserve the integrity of customer data present in its devices in Ukraine, Russia, and Belarus, Cloudflare has implemented Keyless encryption and configured systems to self-isolate in case of compromise.
Read moreGoogle LLC today announced that it has signed a definitive agreement to acquire Mandiant, Inc., a leader in dynamic cyber defense and response, for $5.4 billion
Read moreLinux "Dirty Pipe" vulnerability affects Linux Kernel 5.8 and later versions, even on Android devices, allowing a non-privileged user to inject and overwrite data in read-only files.
Read moreSecurity analysts warn of a sharp rise in API attacks, with most companies still underestimating these high risks.
Read moreSecurity experts from Avanan have observed attackers taking advantage of Teams conversations to introduce malware into an organization.
Read moreThe new 2022 version of ISO/IEC 27002 has been published.
Read moreOffensive Security releases the new version of its popular open source penetration testing platform.
Read more