A threat actor posted an ad on a hacking community forum, claiming they were selling a 2022 database of 487 million…
Browsing: Threat Intelligence
APIs have delivered velocity and competitive advantage to companies of all sizes with IDC research calculating that 10-50% of enterprise revenue is…
Is Defence in Depth still relevant now that the concept of Zero Trust has taken hold? That was the question…
Military conflict is ever shifting from beyond the battlefield and into cyber space. Ever more sophisticated and ruthless groups of…
It has been reported that info-stealing malware accounted for the three most widespread variants in October, comprising nearly a fifth…
Dropbox has suffered a security breach after threat actors stole 130 code repositories after gaining access to one of its GitHub…
It has been reported that Microsoft has confirmed that a misconfigured endpoint unintentionally leaked business and personally identifiable information (PII) for…
There is no doubt that in the right hands, Open-Source Intelligence (OSINT) can bring many positive benefits to the Cyber…
Lumen’s Black Lotus Labs blogs about discovering a new rapidly growing, multipurpose malware written in the Go programming language. Dubbed…
A buyer dilemma is happening now with security solutions as business owners and CISOs realize that legacy rules-based WAF is…