Technology Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator Jun 28, 2024 bleepingcomputer.com The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to…
Technology Chinese Cyberspies Employ Ransomware in Attacks for Diversion Jun 26, 2024 bleepingcomputer.com Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a…
Cyber Security Is Defense Winning? A Look at Decades of Playing Catch Up Jun 26, 2024 darkreading.com In this Black Hat USA preview, scholar Jason Healey examines strategies for measuring and shifting the balance of cyber defense
Cyber Security CISOs Growing More Comfortable With Risk, But Better C-Suite Alignment Needed Jun 26, 2024 darkreading.com PRESS RELEASE SANTA CLARA, Calif., June 25, 2024 /PRNewswire/ — Netskope, a leader in Secure Access Service Edge...
Technology CISA: Most critical open source projects not using memory safe code Jun 26, 2024 bleepingcomputer.com The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published research looking into 172 key open-source projects and whether they…
Cyber Security Is Your Organization a Laggard or a Leader in Digital Trust? Jun 26, 2024 cyberdefensemagazine.com By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected…
Cyber Security ‘ChamelGang’ APT Disguises Espionage Activities With Ransomware Jun 26, 2024 darkreading.com The China-nexus cyberthreat actor has been operating since at least 2019 and has notched victims in multiple countries.
Technology P2PInfect botnet targets REdis servers with new ransomware module Jun 25, 2024 bleepingcomputer.com P2PInfect, originally a dormant peer-to-peer malware botnet with unclear motives, has finally come alive to deploy a ransomware module and…
Technology New attack uses MSC files and Windows XSS flaw to breach networks Jun 24, 2024 bleepingcomputer.com A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform…
Cyber Security Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye Jun 23, 2024 cyberdefensemagazine.com By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable…
Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator
The recent large scale supply chain attack conducted via multiple CDNs, namely Polyfill.io, BootCDN, Bootcss, and Staticfile that affected up to…
Chinese Cyberspies Employ Ransomware in Attacks for Diversion
Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a…
Is Defense Winning? A Look at Decades of Playing Catch Up
In this Black Hat USA preview, scholar Jason Healey examines strategies for measuring and shifting the balance of cyber defense
CISOs Growing More Comfortable With Risk, But Better C-Suite Alignment Needed
PRESS RELEASE SANTA CLARA, Calif., June 25, 2024 /PRNewswire/ — Netskope, a leader in Secure Access Service Edge...
CISA: Most critical open source projects not using memory safe code
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published research looking into 172 key open-source projects and whether they…
Is Your Organization a Laggard or a Leader in Digital Trust?
By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected…
‘ChamelGang’ APT Disguises Espionage Activities With Ransomware
The China-nexus cyberthreat actor has been operating since at least 2019 and has notched victims in multiple countries.
P2PInfect botnet targets REdis servers with new ransomware module
P2PInfect, originally a dormant peer-to-peer malware botnet with unclear motives, has finally come alive to deploy a ransomware module and…
New attack uses MSC files and Windows XSS flaw to breach networks
A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform…
Get 10x more Visibility across APTs with Red Piranha’s SOC-as-a-Service and Crystal Eye
By Adam Bennett, CEO, Red Piranha Cyberattacks are on the rise and it’s crucial for organizations to have a reliable…