Insights on the MOVEit File Transfer Vulnerability
Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. Read More HERE…
Ongoing developments on this topic will be added to this thread. We invite you to bookmark this page and check back. Read More HERE…
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential. Read More HERE…
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential. Read More HERE…
We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities. Read More HERE…
We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability. Read More HERE…
Learn more about smart grid vulnerabilities and how organizations can future-proof their enterprises. Read More HERE…
Two vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of the vulnerabilities, and includes security guidance for IT and SOC professionals. Read More HERE…
We examine three differently sized criminal groups to know how they compare to similarly sized legitimate businesses in terms of how they are organized. We also discuss how threat researchers can use their knowledge of the size and structure of a target criminal organization to aid their investigation. Read More HERE…
In this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity strategy into modernizing environment. Read More HERE…