IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manag...
Category: Attack
î ‚Jan 10, 2024î „NewsroomRansomware / Data Security A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, ...
î ‚Jan 10, 2024î „NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which ...
î ‚Jan 10, 2024î „NewsroomVulnerability / Windows Security Microsoft has addressed a total of 48 security flaws spanning its software as part of its...
î ‚Jan 10, 2024î „NewsroomPatch Management / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six secu...
î ‚Jan 09, 2024î „NewsroomMalware / Cyber Threat A threat actor called Water Curupira has been observed actively distributing the PikaBot loader mal...
î ‚Jan 09, 2024î „NewsroomData Security / Cyber Attack Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S., European Union,...
î ‚Jan 09, 2024î „The Hacker NewsSaaS Security / Data Security Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, M...
î ‚Jan 09, 2024î „NewsroomNetwork Security / Data Protection A security flaw has been disclosed in Kyocera's Device Manager product that could be ex...
î ‚Jan 09, 2024î „NewsroomMalware / Cyber Threat Threat actors are resorting to YouTube videos featuring content related to cracked software in orde...
