DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?
The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity....
Google Detects 4th Chrome Zero-Day in May Actively Under Attack – Update ASAP
Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the...
Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack
Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver malware that's associated with...
Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies
Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact...
Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed."Virtualization platforms are a core component of organizational IT...
CISA Warns of Actively Exploited Apache Flink Security Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework,...
New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts
The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in Africa and the Caribbean as part of...
Inside Operation Diplomatic Specter: Chinese APT Group’s Stealthy Tactics Exposed
Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent threat (APT) group as part of an...
Are Your SaaS Backups as Secure as Your Production Data?
Conversations about data security tend to diverge into three main threads:All are valid and necessary conversations for technology organizations of all shapes and sizes....
Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager
Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager (EPM) that could be exploited to achieve remote code...