North Korea’s BlueNoroff APT Debuts ‘Dumbed Down’ macOS Malware
November 8 2023Kim Jong-Un's hackers are scraping the bottom of the barrel, using script kiddie-grade malware to steal devalued digital assets.
Read moreKim Jong-Un's hackers are scraping the bottom of the barrel, using script kiddie-grade malware to steal devalued digital assets.
Read moreActive ransomware attacks against vulnerable Atlassian Confluence Data Center and Servers ratchets up risk to enterprises, now reflected in the bug's revised CVSS score of 10.
Read moreCompanies must recognize AI's utility, while setting clear boundaries to curtail unsafe utilization.
Read moreThe attackers also use custom wipers to cover their tracks and bypass EDR.
Read moreTo combat sophisticated threats, we need to improve how we approach authorization and access controls.
Read moreGene Spafford wrote an essay reflecting on the Morris Worm of 1988—thirty-five years ago. His lessons from then are still applicable today.
Read moreMandiant/Google Cloud’s Jill C. Tyson offers up timelines, checklists, and other guidance around enterprise-wide readiness to ensure compliance with the new rule.
Read moreAdmins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
Read morePreviously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise "GootBot" attack, each implant with its own C2.
Read moreWith AI and publicly available data, cybercriminals have the resources they need to fake a real-life kidnapping and make you believe it.
Read more
Recent Comments