Exploit released for new Windows Server “WinReg” NTLM Relay attack
Proof-of-concept exploit code is now public for a vulnerability in Microsoft's Remote Registry client that could be used to take control of…
Proof-of-concept exploit code is now public for a vulnerability in Microsoft's Remote Registry client that could be used to take control of…
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold on cybercriminal forums…
MoneyGram has confirmed that hackers stole customers' personal information and transaction data in a September cyberattack that caused a five-day…
MoneyGram says there is no evidence that ransomware is behind a recent cyberattack that led to a five-day outage in September.…
Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strategy…
A new variant of the RomCom malware called SnipBot, has been used in attacks that pivot on the network to…
In this case study, a 180-year-old life and pension insurer brought its security infrastructure into the modern age.
CISA has added CE-2024-40766 to its Known Exploited Vulnerabilities catalog.
While not very sophisticated, brute force password attacks pose a significant threat to an organization's security. Learn more from Specops…
Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it's…