It’s no secret that penetration testing is among the most effective methodologies for helping determine an organization’s risk posture. While…
Browsing: Threat Intelligence
The perpetrators behind the budding Buhti ransomware have abandoned their own payload in favor of exploiting vulnerabilities in Windows and…
Back in March, Microsoft released data suggesting that Russian hacker groups were appearing to be preparing for a renewed wave…
GoldenJackal is a new advanced persistent threat actor that targets government and diplomatic organizations in the Middle East and South…
Threat hunting is the means of exploring and searching for malicious software or unauthorized users on your network. Since a…
Another is the codecov breach, where the attack was made on their docker images and credentials, and the private data of…
Cybersecurity’s increased influence in this digital ecosystem can be traced to the rise of DevSecOps. Organizations are becoming more aware…
CISA & FBI has released a joint Cybersecurity Advisory from government agencies in the United States and Australia to warn…
The Chinese state-sponsored hacking outfit “Camaro Dragon” attacks household TP-Link routers with bespoke “Horse Shell” malware to attack European foreign…
The ransomware attacks of the recently identified RA Group, the latest threat actor to use the stolen Babuk code, have…