Browsing Category
Cybersecurity
Is Your Security Log ‘Bathtub’ About to Overflow?
By Ozan Unlu, CEO and Founder, Edge Delta
Security Log Data – More Data Doesn’t Always Mean Better Protection
A major issue that…
How To Guard Critical Infrastructure Against the Sophisticated ‘Golden…
The Powerful ‘Golden Ticket’ Attacks are Surging in Popularity – What You Need to Know
By David Levine, Director of Solution…
Hackers Hide Malware in Windows Logo, Target Middle East Governments
A hacking group dubbed 'Witchetty' has been observed using a steganographic technique to hide a backdoor in a Windows logo and…
Hackers Backdoor Pirated Windows OS With Cryptominer and Xtreme RAT
Xtreme RAT and Cryptominer have been delivered through pirated copies of the Windows operating system (OS) software.
The…
Lazarus-Associated Hackers Weaponize Open-Source Tools Against Several…
Threat actors associated with North Korea have been spotted weaponizing legitimate open–source software targeting employees in…
Microsoft Confirms Two Exchange Zero-Day Vulnerabilities
Microsoft has today confirmed the existence of two new zero-day vulnerabilities allowing for remote code execution on Microsoft…
How Cloud-Based Services Minimize the Impact of Incident Recovery
Few organizations are able to continue operating after being hit by ransomware, let alone be able to quickly get services back…
NCSC: UK Organizations Can Learn from Ukraine’s Impressive Cyber Defenses
The Russia–Ukraine conflict has facilitated the “most sustained and intensive cyber campaign on record,” according to the National…
Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under…
The European Commission has publicized new liability rules on digital products and artificial intelligence (AI) in order to…
Researchers Discover Chaos, a Golang Multipurpose Botnet
A new multifunctional malware written in the Go programming language has been spotted in the wild, targeting both Windows and…