Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers
Oct 22, 2024Ravie LakshmananVulnerability / Software Security Details have emerged about a…
5 Steps to Boost Detection and Response in a Multi-Layered Cloud
Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection…
Three Critical Ivanti CSA Vulnerabilities Actively Exploited
Oct 08, 2024Ravie LakshmananZero-Day / Vulnerability Ivanti has warned that three new…
A Solution to SOAR’s Unfulfilled Promises
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of…
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Sep 13, 2024Ravie LakshmananSoftware Security / Threat Intelligence Malicious actors are likely…
CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub
The threat actor known as CosmicBeetle has debuted a new custom ransomware…
RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data…
A Call to Action for Securing ICS/OT Environments
Aug 30, 2024The Hacker NewsICS Security / OT Security A comprehensive guide…
New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules
Aug 25, 2024Ravie LakshmananFinancial Fraud / Cybercrime Cybersecurity researchers have uncovered a…