Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techn...
Category: Attack
î Feb 23, 2024î NewsroomRed Teaming / Artificial Intelligence Microsoft has released an open access automation framework called PyRIT (short for P...
î Feb 23, 2024î NewsroomData Privacy / iOS Security Details have emerged about a now-patched high-severity security flaw in Apple's Shortcuts app ...
î Feb 23, 2024î NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5 millio...
î Feb 22, 2024î NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will ...
î Feb 22, 2024î NewsroomMalware / Cyber Espionage An installer for a tool likely used by the Russian Consular Department of the Ministry of Foreig...
î Feb 22, 2024î NewsroomNetwork Security / Penetration Testing A recently open-sourced network mapping tool called SSH-Snake has been repurposed b...
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regio...
The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leade...
î Feb 21, 2024î NewsroomNetwork Security / Vulnerability Cybersecurity researchers have identified two authentication bypass flaws in open-source ...