Six Charged in Mass Takedown of DDoS-for-Hire Sites
December 15 2022The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “booter” or “stresser” services — businesses that make it easy and cheap for even non-technical users to...
Read moreEpic Management Provides Notice of Data Security Incident
December 15 2022Microsoft-Signed Malicious Drivers Usher In EDR-Killers, Ransomware
December 15 2022Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.
Read moreCSAF Is the Future of Vulnerability Management
December 15 2022Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
Read moreApple Zero-Day Actively Exploited on iPhone 15
December 15 2022Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.
Read moreMicrosoft Patch Tuesday, December 2022 Edition
December 15 2022Microsoft has released its final monthly batch of security updates for 2022, fixing more than four dozen security holes in its various Windows operating systems and related software. The...
Read moreMicrosoft Patch Tuesday, December 2022 Edition
December 15 2022Microsoft has released its final monthly batch of security updates for 2022, fixing more than four dozen security holes in its various Windows operating systems and related software. The...
Read moreProofpoint Nabs Illusive, Signaling a Sunset for Deception Tech
December 14 2022Former pure-play deception startup Illusive attracts Proofpoint with its repositioned platform focusing on identity threat detection and response (ITDR).
Read moreThe proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
Read more
Recent Comments