Posts by admin
Leveraging AI and public data to gain control over third-party risk
The security landscape has undergone a significant shift in recent years, with third-party risk emerging as a critical concern for orga...
Over two dozen DDoS booters dismantled in law enforcement operation
Europol has disclosed the disruption of 27 widely used DDoS-for-hire services, or booters — including zdstressernet. starkstressernet, ...
Turla attacks against Ukraine involve other cybercrime groups’ tools
Attacks involved the exploitation of open-source and living-off-the-land tactics previously associated with Chinese advanced persistent...
Southeast Asia subjected to suspected Chinese cyberespionage campaign
Numerous high-profile organizations across Southeast Asia, including government agencies from two countries, a telecommunications firm,...
Trust exploited in widespread ongoing phishing operation
Infiltration of a single user's email in a phishing attack between May 8 and May 9 allowed threat actors to compromise individuals' nam...
More advanced Zloader malware variant emerges
Attacks involved the exploitation of open-source and living-off-the-land tactics previously associated with Chinese advanced persistent...
Silent threats: The hidden danger of machine identities
As non-human identities outnumber humans 45 to 1, enterprises face escalating security risks from unmonitored APIs, bots, and service a...
Cyberattack hits Krispy Kreme’s online ordering systems
Internal and external cybersecurity experts have immediately acted to investigate and address the incident upon its discovery, said Kri...
Electrica Group compromise pinned on Lynx ransomware gang
"Based on available data, critical power supply systems have not been affected and are operational, and the investigation is currently ...
Several Splunk, Atlassian flaws addressed
Updates have been issued by Splunk to address over 15 vulnerabilities impacting its products and third-party dependencies, the most ser...