How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren't protecting the…
TeamViewer Detects Security Breach in Corporate IT Environment
Jun 28, 2024NewsroomData Breach / Enterprise Security TeamViewer on Thursday disclosed it…
New MOVEit Transfer Vulnerability Under Active Exploitation
Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw…
New Attack Technique Exploits Microsoft Management Console Files
Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel…
SolarWinds Serv-U Vulnerability Under Active Attack
Jun 21, 2024NewsroomVulnerability / Data Protection A recently patched high-severity flaw impacting…
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light…
ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
Jun 22, 2024NewsroomCyber Espionage / Threat Intelligence Russian organizations have been targeted…
Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
Jun 21, 2024NewsroomMalware / Threat Intelligence A previously undocumented Chinese-speaking threat actor…
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of…


