Spotlight on Scribe Security
By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the…
By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the…
The Arid Viper APT group is deploying AridSpy malware with Trojanized messaging applications and second-stage data exfiltration.
Navigate the threat intelligence market’s journey through the digital domain and how it integrates to provide a better solution. By…
A newly discovered Linux malware dubbed 'DISGOMOJI' uses the novel approach of utilizing emojis to execute commands on infected devices…
A model can be perfectly innocent, yet still dangerous if the means by which it's packed and unpacked are tainted.
Microsoft is delaying the release of its AI-powered Windows Recall feature to test and secure it further before releasing it…
Ascension, one of the largest U.S. healthcare systems, revealed that a May 2024 ransomware attack was caused by an employee…
By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in…
A new phishing campaign uses HTML attachments that abuse the Windows search protocol (search-ms URI) to push batch files hosted on…
Riskaware by Riskassure Solves a Unique Problem By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In…