Apple Fixes Actively Exploited iPhone Zero-Day VulnerabilityThe vulnerability could allow remote code execution (RCE) on a victim's deviceLeer másThe vulnerability could allow remote code execution (RCE)...
Why Privileged Access Management is a priority task
Why Privileged Access Management is a priority taskExploring how PAM can help mitigate and prevent threats to customer dataLeer másArticles RSS FeedExploring how PAM can help...
New Royal ransomware group evades detection with partial encryption
New Royal ransomware group evades detection with partial encryptionA new ransomware group dubbed Royal that formed earlier this year has significantly ramped up its operations over...
Mozilla Fixes Firefox Vulnerabilities That Could Have Lead to System Takeover
Mozilla Fixes Firefox Vulnerabilities That Could Have Lead to System TakeoverMultiple high-impact vulnerabilities affecting Thunderbird, Firefox ESR, and Firefox were fixed by updates from Mozilla. The...
Obligatory ChatGPT Post
Obligatory ChatGPT PostSeems like absolutely everyone everywhere is playing with Chat GPT. So I did, too…. Write an essay in the style of Bruce Schneier on...
Apple fixed the tenth actively exploited zero-day this year
Apple fixed the tenth actively exploited zero-day this yearApple rolled out security updates to iOS, iPadOS, macOS, tvOS, and Safari to fix a new actively exploited...
Hacking Boston’s CharlieCard
Hacking Boston’s CharlieCardInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard. Leer másSchneier on SecurityInteresting discussion of vulnerabilities and exploits against Boston’s CharlieCard.
AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow
AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot GrowThese are some of the key findings from the latest Check Point Research Most Wanted reportLeer...
Reimagining Democracy
Reimagining DemocracyLast week, I hosted a two-day workshop on reimagining democracy. The idea was to bring together people from a variety of disciplines who are all...
A Security Vulnerability in the KmsdBot Botnet
A Security Vulnerability in the KmsdBot BotnetSecurity researchers found a software bug in the KmsdBot cryptomining botnet: With no error-checking built in, sending KmsdBot a malformed...
December 2022 Patch Tuesday fixed 2 zero-day flaws
December 2022 Patch Tuesday fixed 2 zero-day flawsMicrosoft released December 2022 Patch Tuesday security updates that fix 52 vulnerabilities across its products. Microsoft December 2022 Patch Tuesday security...
SOC Prime Threat Bounty — November 2022 Results
SOC Prime Threat Bounty — November 2022 Results November ‘22 Publications During the previous month, members of Threat Bounty community submitted 433 rules for publication to...
What Is CARTA? Continuous Adaptive Risk and Trust Assessment Explained
What Is CARTA? Continuous Adaptive Risk and Trust Assessment ExplainedDigital services made for consumers are opening up new opportunities and vulnerabilities. With more employees bringing unmanaged...
The Volume and Pace of Cyberattacks is Radically Increasing – Are U.S. Businesses Prepared?
The Volume and Pace of Cyberattacks is Radically Increasing – Are U.S. Businesses Prepared?By Darren Guccione, CEO and Co-Founder, Keeper Security Major shifts in workplace models...
Threats Hackers Pose to the U.S. Military
Threats Hackers Pose to the U.S. MilitaryBy Jacob Hess, CAO & Co-Founder, NGT Academy While digital transformation and adoption of technology are critical to […] The...
Detecting Fantasy Data Wiper Leveraged by Agrius APT in a Supply-Chain Attack
Detecting Fantasy Data Wiper Leveraged by Agrius APT in a Supply-Chain Attack Security experts from ESET revealed a destructive operation launched by Iran-backed Agrius APT to...
Wiz debuts PEACH tenant isolation framework for cloud applications
Wiz debuts PEACH tenant isolation framework for cloud applicationsCloud security vendor Wiz has announced PEACH, a tenant isolation framework for cloud applications designed to evaluate security...
GoTrim botnet actively brute forces WordPress and OpenCart sites
GoTrim botnet actively brute forces WordPress and OpenCart sitesResearchers discovered a new Go-based botnet, dubbed GoTrim, attempting to brute force WordPress websites. Fortinet FortiGuard Labs researchers...
Crooks use HTML smuggling to spread QBot malware via SVG files
Crooks use HTML smuggling to spread QBot malware via SVG filesTalos researchers uncovered a phishing campaign distributing the QBot malware to Windows systems using SVG files....
Social Blade Suffers Data Breach
Social Blade Suffers Data BreachOn December 14th, Social Blade, a statistics website that allows its users to track statistics and measure growth across multiple Social Media...
Signed Microsoft Drivers Used in Attacks Against Businesses
Signed Microsoft Drivers Used in Attacks Against BusinessesIn some cases, the threat actor's intent was to ultimately provide SIM-swapping servicesLeer másIn some cases, the threat actor's...
Platforms Flooded with 144,000 Phishing Packages
Platforms Flooded with 144,000 Phishing PackagesNuGet, PyPi and npm inundated with malicious packagesLeer másNuGet, PyPi and npm inundated with malicious packages
Lacework adds new capabilities to its CSPM solution
Lacework adds new capabilities to its CSPM solutionLacework on Wednesday released new cloud security posture management (CSPM) capabilities, designed to help organizations create custom policies for...
FBI seized 48 domains linked to DDoS-for-Hire service platforms
FBI seized 48 domains linked to DDoS-for-Hire service platformsThe U.S. Department of Justice (DoJ) seized forty-eight domains that offered DDoS-for-Hire Service Platforms to crooks. The U.S....
Over 85% of Attacks Hide in Encrypted Channels
Over 85% of Attacks Hide in Encrypted ChannelsZscaler reveals 20% increase in malicious use of encryptionLeer másZscaler reveals 20% increase in malicious use of encryption
Patch Tuesday Update – Dec 2022
Patch Tuesday Update – Dec 2022‘Tis the Season, and well, this month we continue to get the gift that keeps on giving, Microsoft Patch Tuesday! Yes,...
December 2022 Patch Tuesday: Get Latest Security Updates from Microsoft and More
December 2022 Patch Tuesday: Get Latest Security Updates from Microsoft and MoreTech giant Microsoft released its last set of monthly security updates for 2022 with fixes for...
Cuba ransomware group used Microsoft developer accounts to sign malicious drivers
Cuba ransomware group used Microsoft developer accounts to sign malicious driversMicrosoft suspended several accounts on its hardware developer program that signed malicious drivers used by a...
Building a business case for your SIEM Investment
Building a business case for your SIEM InvestmentChief information security officers (CISOs) are wasting millions of dollars on security products they don’t use – or they...
Feds Hit DDoS-for-Hire Services with 48 Domain Seizures
Feds Hit DDoS-for-Hire Services with 48 Domain SeizuresSix also charged in connection with booter servicesLeer másSix also charged in connection with booter services






















