Category: Attack

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

[ad_1] Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview…

Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

[ad_1] A dormant package available on the Python Package Index (PyPI) repository was updated nearly…

How to Use Tines's SOC Automation Capability Matrix

[ad_1] Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation…

Microsoft Releases PyRIT – A Red Teaming Tool for Generative AI

[ad_1] Microsoft has released an open access automation framework called PyRIT (short for Python Risk Identification Tool)…

Researchers Detail Apple's Recent Zero-Click Shortcuts Vulnerability

[ad_1] Details have emerged about a now-patched high-severity security flaw in Apple's Shortcuts app that…

FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data

[ad_1] The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5…

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

[ad_1] Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will be integrated…

Russian Government Software Backdoored to Deploy Konni RAT Malware

[ad_1] An installer for a tool likely used by the Russian Consular Department of the…

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

[ad_1] A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat actors to conduct…

A New Age of Hacktivism

[ad_1] In the past 2 years, we have observed a significant surge in hacktivism activity…