All posts tagged "cybersecurity"
-
Artificial Intelligence
/ 1 month agoVega Security Raises $120M Series B Led by Accel
Vega Security has secured $120 million in a Series B funding round, a significant investment that values the cybersecurity firm at...
-
Security
/ 1 month agoDutch Agencies Confirm Data Breach via Ivanti Zero-Day Flaw
Two major Dutch government bodies have confirmed that their systems were compromised in cyber attacks exploiting critical vulnerabilities in Ivanti‘s mobile...
-
Security
/ 1 month agoWarlock Ransomware Hits SmarterTools via Unpatched Email Server
SmarterTools confirmed last week that its corporate network was breached by the Warlock ransomware group. The attackers gained access by exploiting...
-
Security
/ 1 month agoFortinet Patches Critical SQL Injection Vulnerability in FortiClientEMS
Fortinet has issued critical security updates to address a severe vulnerability in its FortiClient Enterprise Management Server (EMS) software. The flaw,...
-
Security
/ 1 month agoCyberattack Strategy Shifts from Ransomware to Stealth
A new cybersecurity report indicates a fundamental shift in the primary objectives of cybercriminals, moving away from disruptive ransomware attacks toward...
-
Security
/ 1 month agoSolarWinds Web Help Desk Exploited in Multi-Stage Network Attacks
Microsoft has disclosed that threat actors are actively exploiting internet-exposed instances of SolarWinds Web Help Desk software to gain initial access...
-
Security
/ 1 month agoBeyondTrust Patches Critical RCE Flaw in Remote Support Tools
BeyondTrust has issued critical security updates for its Remote Support and Privileged Remote Access software. The patches address a severe vulnerability...
-
Security
/ 1 month agoWorm Targets Cloud Infrastructure for Criminal Operations
cybersecurity researchers have identified a large-scale, automated campaign exploiting cloud-native platforms to establish malicious infrastructure for future attacks. The worm-driven activity,...
-
Security
/ 1 month agoBloody Wolf Targets Uzbekistan, Russia with NetSupport RAT
A cyber threat actor known as Bloody Wolf has been identified as the source of a spear-phishing campaign targeting organizations in...
-
Security
/ 1 month agoCISOs Address Burnout and MTTR Without New Hires
Chief Information Security Officers (CISOs) at leading organizations are implementing new operational strategies to combat analyst burnout and improve security response...

