Cybersecurity Blog
Behind the Scenes of Matveev’s Ransomware Empire: Tactics and Team
Dec 19, 2023NewsroomRansomware / Russian Hackers Cybersecurity researchers have shed light on the inner workings of ...
The ransomware attack on Westpole is disrupting digital services for Italian public administration
The ransomware attack on Westpole is disrupting digital services for Italian public administration Pierluigi Paganini ...
Xfinity Discloses Massive Data Breach Affecting Over 35 Million People
The breach occurred after attackers exploited a critical vulnerability, known as Citrix Bleed, that had been actively ...
Novel SMTP Smuggling Technique Slips Past DMARC, Email Protections
A novel way to abuse a decades-old protocol used to send emails since the beginning of the Internet allows attackers to ...
Hackers Abusing GitHub to Evade Detection and Control Compromised Hosts
Dec 19, 2023The Hacker NewsSoftware Security / Threat intelligence Threat actors are increasingly making use of GitHub ...
US Agencies Release Security Guidance on Managing SBOMs and Open Source Software
The report provides guidance on open source software adoption, including criteria for selection, risk assessment, ...
CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats
Dec 18, 2023NewsroomSoftware Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ...
Are We Ready to Give Up on Security Awareness Training?
Some of you have already started budgeting for 2024 and allocating funds to security areas within your organization. It ...