Network SecurityCisco firewalls targeted in sophisticated nation-state espionage hackSecurity agencies sound alarm over campaign aimed at Cisco’s Adaptive Security Appliance software.
Network SecurityCoralRaider leverages CDN cache domains in new infostealer campaignA new CryptBot variant targets password managers and authentication apps in the new campaign.
Network SecurityElusive group ToddyCat refines techniques for large-scale data theftThe stealthy threat group is particularly focused on exfiltrating data from Asia-Pacific government and defense organizations.
Cloud SecurityRubrik IPO signals potential cybersecurity-led tech market revivalMarket experts say a resurgence of successful cybersecurity IPOs is likely on the way.
RansomwareAkira takes in $42 million in ransom payments, now targets Linux serversSecurity pros say threat actors gravitate towards Linux because it’s the OS of choice for many critical server functions.
Cloud SecurityMicrosoft finds Kubernetes clusters targeted by OpenMetadata exploitsA cryptominer campaign leveraged five vulnerabilities in OpenMetadata to infect environments.
Critical Infrastructure SecurityRussia’s Sandworm APT linked to attack on Texas water plantThe threat group is best known for its sustained campaign against Ukrainian targets and infrastructure.
Threat ManagementNavigating the cyber seas: Clarity, compliance, and unified endpoint management A unified approach to endpoint management can serve as a compass and map to avoid cyber obstacles.
Network SecurityBrute-force attacks surge worldwide, warns Cisco Talos While a longstanding method, the scale and systematic execution of the attacks signify an escalation, security pros said.
Application securityScammers offer cash to phone carrier staff to swap SIM cardsT-Mobile and Verizon workers report receiving text messages offering them up to $300 for each illegal SIM swap they complete.
How to bridge the gap between the IT and legal staffs to better combat insider riskJoe PayneApril 2, 2024
It makes sense for the Biden administration to focus on software security – but it’s up to the industry to make it happen John Funge November 29, 2023
Five attack vectors that businesses should focus on in the wake of the Israel-Hamas warJeremiah Fowler November 6, 2023