How to Protect Your Environment From the NTLM Vulnerability
This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.
This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.
The US Department of Justice has charged a Russian-Israeli dual-national for his suspected role in developing malware and managing the…
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
The Play ransomware gang has claimed responsibility for a cyberattack that impacted the business operations of the U.S. doughnut chain…
An ongoing phishing scam is abusing Google Calendar invites and Google Drawings pages to steal credentials while bypassing spam filters.…
The Russian hacking group tracked as APT29 (aka "Midnight Blizzard") is using a network of 193 remote desktop protocol proxy servers…
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of…
A cyberespionage threat group known as 'Bitter' was observed targeting defense organizations in Turkey using a novel malware family named…
Data breaches impacted more than 1 billion users in the first half of 2024, up 409% from this time last year, emphasizing the…
A large-scale malvertising campaign distributed the Lumma Stealer info-stealing malware through fake CAPTCHA verification pages that prompt users to run…