Network SecurityCisco firewalls targeted in sophisticated nation-state espionage hackSecurity agencies sound alarm over campaign aimed at Cisco’s Adaptive Security Appliance software.
Network SecurityCoralRaider leverages CDN cache domains in new infostealer campaignA new CryptBot variant targets password managers and authentication apps in the new campaign.
Network SecurityElusive group ToddyCat refines techniques for large-scale data theftThe stealthy threat group is particularly focused on exfiltrating data from Asia-Pacific government and defense organizations.
Threat ManagementNavigating the cyber seas: Clarity, compliance, and unified endpoint management A unified approach to endpoint management can serve as a compass and map to avoid cyber obstacles.
RansomwareAkira takes in $42 million in ransom payments, now targets Linux serversSecurity pros say threat actors gravitate towards Linux because it’s the OS of choice for many critical server functions.
Cloud SecurityMicrosoft finds Kubernetes clusters targeted by OpenMetadata exploitsA cryptominer campaign leveraged five vulnerabilities in OpenMetadata to infect environments.
Critical Infrastructure SecurityRussia’s Sandworm APT linked to attack on Texas water plantThe threat group is best known for its sustained campaign against Ukrainian targets and infrastructure.
Application securityAfter a 19-month saga, Broadcom finally patches Brocade SANnav bugsSecurity pros say given the complexity of SAN management tools, it’s understandable the patches took so long.
Network SecurityBrute-force attacks surge worldwide, warns Cisco Talos While a longstanding method, the scale and systematic execution of the attacks signify an escalation, security pros said.
Application securityScammers offer cash to phone carrier staff to swap SIM cardsT-Mobile and Verizon workers report receiving text messages offering them up to $300 for each illegal SIM swap they complete.
How to bridge the gap between the IT and legal staffs to better combat insider riskJoe PayneApril 2, 2024
It makes sense for the Biden administration to focus on software security – but it’s up to the industry to make it happen John Funge November 29, 2023
Five attack vectors that businesses should focus on in the wake of the Israel-Hamas warJeremiah Fowler November 6, 2023