Cybersecurity Blog
Report: Log4J Still Among Top Exploited Vulnerabilities
In a new report, Cato observed that the Log4J exploit represented 30% of the outbound vulnerability exploitations and ...
Ransomware Operations are Becoming Less Profitable
Ransomware operations are experiencing a decline in profitability due to various factors such as increased cyber ...
Managed service providers: A gateway for cyber attacks
While there are many MSP-related threats out there, the reality is not as dire as one might think
Update: MITRE Attributes the Recent Attack to China-linked UNC5221
The attackers exploited two zero-day vulnerabilities in Ivanti Connect Secure to gain initial access to MITRE’s ...
Scattered Spider Group a Unique Challenge for Cyber Cops, FBI Leader Says
Identified by analysts in 2022, the hackers use social engineering to lure users into giving up their login credentials ...
Hackers Exploit LiteSpeed Cache Flaw to Create WordPress Admins
WPScan observed in April increased exploitation activity against WordPress sites with versions of the plugin older than ...
Law Enforcement Agencies Identified LockBit Ransomware Admin and Sanctioned Him
The FBI, UK National Crime Agency, and Europol have unmasked the identity of the admin of the LockBit ransomware ...
Over 50,000 Tinyproxy Servers Vulnerable to Critical RCE Flaw
A critical remote code execution (RCE) flaw, CVE-2023-49606, was found affecting nearly 52,000 Tinyproxy servers. This ...