Blogs
Think like an attacker: Increase attack surface visibility with integrated exposure management
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Think like an attacker: Increase attack surface visibility with integrated exposure management
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Think like an attacker: Increase attack surface visibility with integrated exposure management
Today’s cyber defenders are working from a siloed set of security signals, capabilities, and visibility. This model creates gaps in def...
Google further increases stake in Anthropic by $1 billion
News
The news brings Google’s total investment in the AI specialist to $3 billion and builds on their existing 10% ownership share
Go...
RansomHub lays claim on American Standard, Grohe breaches
In a post on its leak site on Wednesday, RansomHub asserted that it was able to exfiltrate 400 GB of data from American Standard's netw...
Over 70M purportedly compromised in PowerSchool hack
Infiltration of PowerSchool's student information systems via stolen customer support portal credentials has primarily impacted the Tor...
New Chinese cyberespionage campaign targeted South Korean VPN service
Organizations across East Asia, including a semiconductor firm and software development company in South Korea and others in China and ...
Malware deployed via new ClickFix attack variant using Silk Road founder as lure
Attackers who made fraudulent but verified Ross Ulbricht accounts on X, formerly Twitter, sought to lure users into joining Telegram ch...
Ivanti CSA exploit chains examined in joint CISA, FBI advisory
Attacks with the chained vulnerabilities have been thwarted by three organizations, with the first preventing compromise following sysa...
Widespread AIRASHI botnet detailed in new report
Intrusions exploiting a Cambium Networks cnPilot router zero-day have been launched by threat actors to facilitate the distribution of ...