î ‚Feb 23, 2024î „NewsroomSupply Chain Attack / Malware A dormant package available on the Python Package Index (PyPI) repository was updated nearly...
Category: Attack
Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techn...
î ‚Feb 23, 2024î „NewsroomRed Teaming / Artificial Intelligence Microsoft has released an open access automation framework called PyRIT (short for P...
î ‚Feb 23, 2024î „NewsroomData Privacy / iOS Security Details have emerged about a now-patched high-severity security flaw in Apple's Shortcuts app ...
î ‚Feb 23, 2024î „NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5 millio...
î ‚Feb 22, 2024î „NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will ...
î ‚Feb 22, 2024î „NewsroomMalware / Cyber Espionage An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreig...
î ‚Feb 22, 2024î „NewsroomNetwork Security / Penetration Testing A recently open-sourced network mapping tool called SSH-Snake has been repurposed b...
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regio...
The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leade...
