News

  • Iranian Hackers Launch Renewed Attack on Albania

    PRIVACY PRIVACY Prime Minister warns of disruption at border crossings Read More

    Read More

  • CNAPP buyers guide: Top tools compared

    PRIVACY PRIVACY Cloud security continues to be a vexing situation, and the tool set continues to become more complex, riddled with acronyms representing possible solutions. Now there’s another: the cloud native application protection platform, or CNAPP. This tool combines the coverage of four separate products: A cloud infrastructure entitlements manager (CIEM) that manages overall access…

    Read More

  • Researchers Warn of 674% Surge in Deadbolt Ransomware

    PRIVACY PRIVACY Malware continues to infect QNAP devices Read More

    Read More

  • Hands-on cyberattacks jump 50%, CrowdStrike reports

    PRIVACY PRIVACY Enterprises monitored by CrowdStrike’s Falcon OverWatch threat hunters faced 77,000 attempts of hands-on, interactive intrusions, or approximately one potential intrusion every seven minutes, between July 1, 2021, and June 30, 2022—a 50% year-over-year increase, according to a new report from the cybersecurity company. Breakout time, or the time an adversary takes to move…

    Read More

  • US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies

    PRIVACY PRIVACY Iran would have directed several networks of cyber threat actors in support of its political goals Read More

    Read More

  • Navigating Today’s Security Challenges at InfoSec World 2022

    PRIVACY PRIVACY CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida. Read More

    Read More

  • High Severity Vulnerabilities Found in HP Enterprise Devices

    PRIVACY PRIVACY The flaws affect HP EliteBook devices and have CVSS scores between 7.5 and 8.2 Read More

    Read More

  • Oxeye Discovers Several High Severity IDOR Vulnerabilities in Harbor

    PRIVACY PRIVACY The flaws were discovered despite Harbor having implemented RBAC on most HTTP endpoints Read More

    Read More

  • New Linux Cryptomining Malware

    PRIVACY PRIVACY It’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code to avoid detection. Shikitega alters its code each time it runs through one of several decoding loops that AT&T said each deliver multiple attacks, beginning…

    Read More

  • How to unite security and compliance in 5 simple ways

    PRIVACY PRIVACY This blog was written by an independent guest blogger. We have entered the era of data compliance laws, but regulations have not quite caught up to the level of risk that most organizations are exposed to. Uniting security and compliance is crucial to maintaining regulation standards and ensuring a secure environment for your…

    Read More

News, Advisories and much more

Exit mobile version