breach
-
How to Securely Onboard New Employees Without Sharing Temporary Passwords
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice…
Read More » -
Safeguard Personal and Corporate Identities with Identity Intelligence
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each…
Read More » -
APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K.
Several organizations operating within global shipping and logistics, media and entertainment, technology, and automotive sectors in Italy, Spain, Taiwan, Thailand,…
Read More » -
SolarWinds Patches 8 Critical Flaws in Access Rights Manager Software
SolarWinds has addressed a set of critical security flaws impacting its Access Rights Manager (ARM) software that could be exploited…
Read More » -
WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach
Indian cryptocurrency exchange WazirX has confirmed that it was the target of a security breach that led to the theft…
Read More » -
China-linked APT17 Targets Italian Companies with 9002 RAT Malware
Jul 17, 2024NewsroomCyber Espionage / Threat Intelligence A China-linked threat actor called APT17 has been observed targeting Italian companies and…
Read More » -
Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks
Jul 17, 2024NewsroomCybercrime / Ransomware The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub…
Read More » -
Threat Prevention & Detection in SaaS Environments – 101
Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and…
Read More » -
Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service
Jul 08, 2024NewsroomVulnerability / Software Security Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs…
Read More » -
Blueprint for Success: Implementing a CTEM Operation
Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface isn’t what it once was and it’s becoming…
Read More »