Category: Attack

4 Instructive Postmortems on Data Downtime and Loss

[ad_1] More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize…

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

[ad_1] The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of…

GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories

[ad_1] GitHub on Thursday announced that it’s enabling secret scanning push protection by default for…

New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems

[ad_1] Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even…

How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI

[ad_1] As an IT leader, staying on top of the latest cybersecurity developments is essential…

Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks

[ad_1] The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the…

GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks

[ad_1] Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in…

Lazarus Exploits Typos to Sneak PyPI Malware into Dev Systems

[ad_1] The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python…

New Backdoor Targeting European Officials Linked to Indian Diplomatic Events

[ad_1] A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European countries with…

Chinese Hackers Exploiting Ivanti VPN Flaws to Deploy New Malware

[ad_1] At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed…