Cybersecurity Blog
Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability
Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ...
Bitwarden Adds Passkey Support to Log Into Web Password Vaults
Passkeys in Bitwarden are generated using the PRF WebAuthn extension, which derives a unique encryption key from the ...
Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families
Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by ...
Fake Recruiters Defraud Facebook Users via Remote Work Offers
A fresh wave of job scams is spreading on Meta’s Facebook platform that aims to lure users with offers for ...
Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion
The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a ...
Further analysis of Denmark attacks leads to warning about unpatched network gear
What happened in Denmark can also happen to you, cybersecurity researchers are warning in a new report that examines ...
Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO
Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances ...
Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP
Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical ...