Cybersecurity Blog
Latrodectus Malware Loader Emerges as Potential Replacement for IcedID
Researchers have observed a surge in email phishing campaigns delivering Latrodectus, a new malware loader believed to ...
The Importance of Access Controls in Incident Response
Adequate IAM policies are essential for incident management tooling to ensure the right people can quickly address ...
Grandoreiro Banking Trojan is Back With Major Updates
The Grandoreiro banking Trojan has resurfaced with major updates, including enhanced functionality and the ability to ...
Addressing the Cybersecurity Vendor Ecosystem Disconnect
Experts highlight the need for better collaboration within the cybersecurity vendor ecosystem to help security teams ...
Kinsing Hacker Group Expands its Cryptoming Botnet Network with More Vulnerability Exploits
The Kinsing hacker group has demonstrated its ability to continuously evolve and adapt, quickly integrating newly ...
White House Unveils AI Safety Framework for US Workers
The White House unveiled a framework to protect U.S. workers from AI risks, emphasizing health and safety rights, ...
CISA Senior Official Goldstein to Leave Agency in June
Eric Goldstein, the executive assistant director for cybersecurity at the CISA, is leaving the agency in June after ...
Intel Discloses Max Severity Bug in Its AI Model Compression Software
Intel has disclosed a critical vulnerability in its AI model compression software, Intel Neural Compressor, that allows ...