Understanding the ‘Morphology’ of Ransomware: A Deeper Dive

Understanding the visible landscape is more accurate when we understand the underlying morphology that shapes the…

CISA Warns of Exploited Vulnerabilities Impacting Dahua Products

The US cybersecurity agency CISA this week issued a warning over the exploitation of two critical-severity…

Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira

Atlassian has published its August 2024 security bulletin, which details nine high-severity vulnerabilities impacting Bamboo, Confluence,…

Cisco Patches High-Severity Vulnerability Reported by NSA

Cisco on Wednesday announced patches for multiple vulnerabilities across its products, including a high-severity bug in…

CrowdStrike Hits Back at Action1 Following $1 Billion Acquisition Rumors

CrowdStrike has denied having any significant acquisition talks with patch management firm Action1 following rumors of…

Huntress Unveils ‘Intuitive’ SIEM Offering Tailored To MSPs, SMBs

Huntress unveiled its new managed SIEM offering that aims to be a less-complicated and more-affordable alternative…

Tenable Vulnerability Management Accelerates Security Response with Context-Driven Prioritization

Vulnerability management has been crucial for effective cybersecurity for years. How has it evolved recently to…

CrowdStrike Outage Fallout: 5 New Developments

Matters related to the widely felt July 19 outage caused by a faulty CrowdStrike update have begun shifting…

CrowdStrike Pushes Back Against Delta Legal Threats Over Outage

CrowdStrike is contending that Delta did not accept offers of help amid the multi-day outage that impacted the…

Suspicious Minds: Insider Threats in The SaaS World

Everyone loves the double-agent plot twist in a spy movie, but it’s a different story when…