The Russia-backed Nobelium APT has pioneered a post-exploitation tool allowing attackers to authenticate as any user.
Read moreRansomware Gang Demands $10M in Attack on French Hospital
August 24 2022Center Hospitalier Sud Francilien (CHSF), a hospital outside of Paris, has redirected incoming patients to other medical facilities in the wake of a ransomware attack that began on Aug....
Read moreAn insider threat or remote attacker with initial access could exploit CVE-2022-31676 to steal sensitive data and scoop up user credentials for follow-on attacks.
Read moreAn insider threat or remote attacker with initial access could exploit CVE-2022-31676 to steal sensitive data and scoop up user credentials for follow-on attacks.
Read moreNew Zero-Trust Maturity Data: Charting Your Own Organization
August 24 2022Every organization is on a zero-trust journey. Learn about how critical identity is to your security evolution, and how your organization can move forward.
Read moreFacing the New Security Challenges That Come With Cloud
August 24 2022Organizations relying on multicloud or hybrid-cloud environments without a true understanding of their security vulnerabilities do so at their peril.
Read moreOne bit per second makes the Voyager probe data rate seem blindingly fast. But it's enough to break your security assumptions...
Read moreOne bit per second makes the Voyager probe data rate seem blindingly fast. But it's enough to break your security assumptions...
Read moreUnusual Microsoft 365 Phishing Campaign Spoofs eFax Via Compromised Dynamics Voice Account
August 24 2022In a widespread campaign, threat actors use a compromised Dynamics 365 Customer Voice business account and a link posing as a survey to steal Microsoft 365 credentials.
Read moreSolarWinds CISO Tim Brown explains how organizations can prepare for eventualities like the nation-state attack on his company’s software.
Read more
Recent Comments