Cybersecurity Blog
New Mallox Ransomware Variant Targets Linux Systems
A new variant of Mallox ransomware has been discovered by cybersecurity researchers at Uptycs, targeting Linux systems ...
Splunk Addresses Critical Vulnerabilities in Enterprise and Cloud Platforms
Splunk has released a set of security updates to address 16 vulnerabilities in Splunk Enterprise and Cloud Platform, ...
Update: Network Segmentation Hobbled Midnight Blizzard’s Attack on TeamViewer
The company revealed that their corporate IT network, production environment, and TeamViewer connectivity platform are ...
Increase in the Exploitation of Microsoft SmartScreen Vulnerability
Cyble Research and Intelligence Labs (CRIL) has identified an increase in the exploitation of the Microsoft SmartScreen ...
Critical Infrastructure Providers Seek Guardrails on Scope, Timeline for CIRCIA Rules
Critical infrastructure providers are urging federal officials for more flexibility in reporting cyber incidents within ...
Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective
Attackers can leverage the Jenkins Script Console to execute malicious Groovy scripts, leading to cybercriminal ...
4 benefits of security testing in agile environments
Security teams require efficient, cost-effective solutions to mitigate the risk of a successful cyber attack
As Cyber Command Evolves, Its Novel Malware Alert System Fades Away
The shift away from public disclosure on Twitter is part of an evolution in how the CNMF communicates cyber threat ...