Data security is in the headlines often, and it's almost never for a positive reason. Major breaches, new ways to hack into an organization's su...
Category: Attack
Sep 27, 2023THNMalware / Cyber Threat A new malware strain called ZenRAT has emerged in the wild that's distributed via bogus installation pac...
Sep 27, 2023THNZero Day / Vulnerability Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library for...
Sep 26, 2023THNEndpoint Security / Password Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major up...
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many ...
Sep 26, 2023THNMobile Security / Malware An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 f...
SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can make even a compliance e...
How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry Gain...
Sep 26, 2023THNCyber Espionage / Malware A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Kor...
Sep 26, 2023THNVulnerability / Source Code A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous d...