Hackers Backdoor Pirated Windows OS With Cryptominer and Xtreme RAT
The behavior of the actors was reportedly identical to what was described by Minerva Labs in 2021 Read More
Enterprises embrace devsecops practices against supply chain attacks
For enterprise security professionals alarmed about the rising number of supply chain attacks, a report released this week by Google and supply chain security firm...
Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several Countries
The advisory suggests Zinc has targeted media, defense and aerospace, and IT services Read More
Watchfinder warns customers that hackers stole their data
Luxury pre-owned watch website Watchfinder has warned its user base that their personal data has been accessed after an employee's account was broken into and...
Microsoft Confirms Two Exchange Zero-Day Vulnerabilities
The vulnerabilities were first discovered by Vietnamese cybersecurity firm GTSC Read More
Security Vulnerabilities in Covert CIA Websites
Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by—at least—China and Iran, and that the...
CVE-2022-41040 and CVE-2022-41082: ProxyShell Variant Exploited in the Wild
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available. Background...
NCSC: UK Organizations Can Learn from Ukraine’s Impressive Cyber Defenses
NCSC CEO, Lindy Cameron, outlines the UK's observations of the cyber dimension of the Russia-Ukraine conflict Read More
How analyzing employee behavior can improve your cybersecurity posture
This blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology...
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical...