How Automation Can Help Security Policy Optimization
One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,…
One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,…
Ukrainian national Mark Sokolovsky has pleaded guilty to his involvement in the Raccoon Stealer malware-as-a-service (MaaS) cybercrime operation. [...]
There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small”…
The successful disruption of notorious Russian hacker group Star Blizzard's operations arrives one month out from the US presidential election…
A recently disclosed vulnerability in the Common Unix Printing System (CUPS) open-source printing system can be exploited by threat actors…
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other…
Ivanti reports that the bug is being actively exploited in the wild for select customers.
Microsoft and the Justice Department have seized over 100 domains used by the Russian ColdRiver hacking group to target United States…
During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8…
Organizations that get relieved of credentials to their cloud environments can quickly find themselves part of a disturbing new trend:…