New Exterro FTK Update Accelerates Mobile Digital Forensics
August 25 2022The FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.
Read moreThe FTK 7.6 portfolio promises better integration with other security and network resources, as well as unified analysis of mobile and computer evidence.
Read moreThe US Cybersecurity and Infrastructure Security Agency had wanted federal agencies to implement the fix for the RCE flaw in Hikvision cameras by Jan. 24, 2022.
Read moreHere’s a phishing campaign that uses a man-in-the-middle attack to defeat multi-factor authentication:
Microsoft observed a campaign that inserted an attacker-controlled proxy site between the account users and the...
Read more
The bug tracked as CVE-2022-0028 allows attackers to hijack firewalls without authentication, in order to mount DDoS hits on their targets of choice.
Read moreThe Russia-backed Nobelium APT has pioneered a post-exploitation tool allowing attackers to authenticate as any user.
Read moreCenter Hospitalier Sud Francilien (CHSF), a hospital outside of Paris, has redirected incoming patients to other medical facilities in the wake of a ransomware attack that began on Aug....
Read moreAn insider threat or remote attacker with initial access could exploit CVE-2022-31676 to steal sensitive data and scoop up user credentials for follow-on attacks.
Read moreAn insider threat or remote attacker with initial access could exploit CVE-2022-31676 to steal sensitive data and scoop up user credentials for follow-on attacks.
Read moreEvery organization is on a zero-trust journey. Learn about how critical identity is to your security evolution, and how your organization can move forward.
Read moreOrganizations relying on multicloud or hybrid-cloud environments without a true understanding of their security vulnerabilities do so at their peril.
Read more
Recent Comments