Exposure Management and Your Attack Surface
Read the full article for key points from Intruder's VP of Product,…
Identity Threat Detection and Response Solution Guide
Aug 15, 2024The Hacker NewsIdentity Security / Threat Detection The Emergence of…
CrowdStrike Warns of New Phishing Scam Targeting German Customers
CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on…
French Authorities Launch Operation to Remove PlugX Malware from Infected Systems
Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with…
New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection
Jul 15, 2024NewsroomNetwork Security / Data Protection Cybersecurity researchers have shed light…
New Ransomware Group Exploiting Veeam Backup Software Vulnerability
Jul 10, 2024NewsroomData Breach / Malware A now-patched security flaw in Veeam…
TeamViewer Detects Security Breach in Corporate IT Environment
Jun 28, 2024NewsroomData Breach / Enterprise Security TeamViewer on Thursday disclosed it…
Ease the Burden with AI-Driven Threat Intelligence Reporting
Jun 24, 2024The Hacker NewsThreat Intelligence / Cybersecurity Learn about critical threats…
How to Use Tines’s SOC Automation Capability Matrix
Created by John Tuckner and the team at automation and AI-powered workflow…