Okta has warned organizations of an increase in what it has described as “phishing social engineering…
Author: admin
Amazon Security Chief On Stopping 2.7 Trillion EC2 Attacks, 28 Billion S3 Storage Attempts
Amazon’s Chief Information Security Officer and cybersecurity guru CJ Moses takes a deep dive with CRN about how…
HubPhish Abuses HubSpot Tools to Target 20,000 European Users for Credential Theft
Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim…
Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected
Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could…
Not Your Old ActiveState: Introducing our End-to-End OS Platform
Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However,…
APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as…
Schneider Electric Investigating Security ‘Incident’ After Reported Hacker Claims
Schneider Electric confirmed Monday that a developer platform used by the company was impacted by a…
Cynomi Hires Security Vet Ken Marks As CRO To Drive vCISO Platform Growth
Cynomi, an MSP-focused startup whose vCISO platform is tailored toward securing small and medium-sized enterprises, announced…
New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers
Over 1,500 Android devices have been infected by a new strain of Android banking malware called…
Leveraging Wazuh for Zero Trust security
Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously…