Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Jan 21, 2025Ravie LakshmananMalware / Cyber Threat The Computer Emergency Response Team…
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
Dec 31, 2024Ravie LakshmananVulnerability / Incident Response The United States Treasury Department…
CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed
Nov 15, 2024Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection An ongoing threat campaign…
Leveraging Wazuh for Zero Trust security
Zero Trust security changes how organizations handle security by doing away with…
LottieFiles Issues Warning About Compromised “lottie-player” npm Package
Oct 31, 2024Ravie LakshmananCryptocurrency / Software Development LottieFiles has revealed that its…
5 SaaS Misconfigurations Leading to Major Fu*%@ Ups
Nov 01, 2024The Hacker NewsSaaS Security / Insider Threat With so many…
North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea…