A Chinese-speaking advanced persistent threat (APT) is exploiting the ProxyLogon Microsoft Exchange vulnerability to deploy the ShadowPad malware, researchers said — with the end...
After a 2021 beleaguered by ransomware, attack volumes continue to balloon in 2022. In fact, a report issued Tuesday indicates that in just the first...
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like...
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
Ransomware groups are abusing unpatched...
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
Russia-linked cyber...
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
The Cybersecurity and Infrastructure Security Agency (CISA) and Coast...
No operating system is immune to threats, and a thorough endpoint security strategy accommodates the requirements for each one. Toward that end, the National...