breach
-
Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution
Broadcom on Tuesday released updates to address a critical security flaw impacting VMware vCenter Server that could pave the way…
Read More » -
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit?…
Read More » -
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for…
Read More » -
Top 3 Threat Report Insights for Q2 2024
Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical…
Read More » -
DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe
A “simplified Chinese-speaking actor” has been linked to a new campaign that has targeted multiple countries in Asia and Europe…
Read More » -
Ivanti Releases Urgent Security Updates for Endpoint Manager Vulnerabilities
Ivanti has released software updates to address multiple security flaws impacting Endpoint Manager (EPM), including 10 critical vulnerabilities that could…
Read More » -
One More Tool Will Do It? Reflecting on the CrowdStrike Fallout
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus…
Read More » -
Wing Security SaaS Pulse: Continuous Security & Actionable Insights — For Free
Designed to be more than a one-time assessment— Wing Security’s SaaS Pulse provides organizations with actionable insights and continuous oversight…
Read More » -
TIDRONE Espionage Group Targets Taiwan Drone Makers in Cyber Campaign
A previously undocumented threat actor with likely ties to Chinese-speaking groups has predominantly singled out drone manufacturers in Taiwan as…
Read More » -
New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or…
Read More »