Cybersecurity Blog
Cybersecurity Leaders Expect Their SOC Budgets to Grow, KPMG Finds
Cybersecurity leaders expect their security operations center (SOC) budgets to grow by up to 20% over the next two ...
Cloud Security Incidents Make Organizations Turn to AI-Powered Prevention
Organizations are increasingly using AI-powered measures to address the rise in cloud security incidents, as traditional ...
New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs
A new report from XM Cyber has found – among other insights – a dramatic gap between where most organizations ...
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the ...
FCC Might Require Telecoms to Report on Securing Internet’s BGP Technology
The FCC is proposing to mandate that broadband providers develop BGP security plans and document their use of the ...
Remote-Access Tools the Intrusion Point to Blame for Most Ransomware Attacks
As per cybersecurity insurance firm At-Bay, remote-access tools, particularly self-managed VPNs from Cisco and Citrix, ...
Critical Git Vulnerability Allows RCE When Cloning Repositories With Submodules
The vulnerability can be exploited on multi-user machines, where an attacker can prepare a local repository to look like ...
Cybersecurity Analysis Exposes High-Risk Assets in Power and Healthcare Sectors
Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that ...