Analyzing Four Diverse Attack Techniques Used by XeGroup
By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated…
By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated…
For months, the Iran-backed APT has carried out waves of password spray attacks attempting to authenticate to thousands of environments…
By Travis Doe, Marketing Executive, Secure IT Consult Introduction In today’s digital age, where technology is deeply integrated into our…
Men and woman are different. This basic fact bears repeating these days as we combat pervasive transgender ideology. But too…
A new information stealer malware named 'MetaStealer' has appeared in the wild, stealing a wide variety of sensitive information from…
The Associated Press is warning of a data breach impacting AP Stylebook customers where the attackers used the stolen data…
It started as a slow ransomware news week but slowly picked up pace with the Department of Justice announcing indictments…
Cyberattackers could exploit CVE-2023-20238 to carry out a variety of nefarious deeds, from data theft and code execution to phishing,…
Google shortened the lifetime of Transport Layer Security (TLS) certificates, and Microsoft plans to downgrade support for older versions, giving…
Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat.