Is your password policy working? Key cybersecurity KPIs to measure
Are your password policies having a positive impact on the cybersecurity posture of your org? Learn more from Specops Software…
Are your password policies having a positive impact on the cybersecurity posture of your org? Learn more from Specops Software…
Threat actors are exploiting a misconfiguration in Selenium Grid, a popular web app testing framework, to deploy a modified XMRig tool…
The Andariel group is targeting critical defense, aerospace, nuclear, and engineering companies for data theft, the FBI, NSA, and others…
The French police and Europol are pushing out a "disinfection solution" that automatically removes the PlugX malware from infected devices…
The Chinese hacking group tracked as 'Evasive Panda' was spotted using new versions of the Macma backdoor and the Nightdoor…
CrowdStrike is warning that a fake recovery manual to repair Windows devices is installing a new information-stealing malware called Daolpu.…
The Coalition for Secure AI is a consortium of influential AI companies aiming to develop tools to secure AI applications…
According to Mandiant, among the many cyber espionage tools the threat actor is using is a sophisticated new dropper called…
The Iranian-backed MuddyWater hacking group has partially switched to using a new custom-tailored malware implant to steal files and run…
Threat actors commonly use Living Off The Land (LOTL) techniques to evade detection. Learn more from Wazuh about how its…