Vulnerability management has been crucial for effective cybersecurity for years. How has it evolved recently to…
Author: admin
CrowdStrike Outage Fallout: 5 New Developments
Matters related to the widely felt July 19 outage caused by a faulty CrowdStrike update have begun shifting…
CrowdStrike Pushes Back Against Delta Legal Threats Over Outage
CrowdStrike is contending that Delta did not accept offers of help amid the multi-day outage that impacted the…
Suspicious Minds: Insider Threats in The SaaS World
Everyone loves the double-agent plot twist in a spy movie, but it’s a different story when…
North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry
The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the…
Google Patches New Android Kernel Vulnerability Exploited in the Wild
Google has addressed a high-severity security flaw impacting the Android kernel that it said has been…
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking…
Microsoft: Windows ‘Clearly’ Needs Better Resilience After CrowdStrike Outage
Microsoft acknowledged that it must “prioritize change and innovation” for Windows following the massive CrowdStrike-caused outage to the…
SentinelOne CEO: Cybersecurity Shouldn’t Require Constant Updates
The unprecedented IT outage caused by a faulty CrowdStrike update a week ago has raised questions about the…
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
“For CISOs, the main takeaway here is to take extra care of their organization’s cloud posture…