Microsoft’s July Update Patches 143 Flaws, Including Two Actively Exploited
Jul 10, 2024NewsroomEndpoint Security / Vulnerability Microsoft has released patches to address…
New APT Group “CloudSorcerer” Targets Russian Government Entities
Jul 08, 2024NewsroomCyber Espionage / Cloud Security A previously undocumented advanced persistent…
Twilio’s Authy App Breach Exposes Millions of Phone Numbers
Jul 04, 2024NewsroomData Breach / Mobile Security Cloud communications provider Twilio has…
Blueprint for Success: Implementing a CTEM Operation
Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface…
How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren't protecting the…
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured…
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor…
2025 CISO Plans and Priorities
Seventy percent of enterprises are prioritizing investment in SaaS security by establishing…
U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
Jun 16, 2024NewsroomCybercrime / SIM Swapping Law enforcement authorities have allegedly arrested…


