Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign…
Graylog Redefines SIEM with More Efficient and Effective Threat Detection
These enhancements, and many others in the Fall 2024 release, help organizations realign their time and…
ESET Distributor’s Systems Abused to Deliver Wiper Malware
ESET has launched an investigation after the systems of its official product distributor in Israel were…
THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)
Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks…
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers
Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that…
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
North Korean information technology (IT) workers who obtain employment under false identities in Western companies are…
Channel Women In Security: Understanding Risk In Digital Security
In the first episode of Channel Women in Security, Cass Cooper speaks with Rosanna Filingeri, Vice…
Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers
Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if…
Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised…
A Comprehensive Guide to Finding Service Accounts in Active Directory
Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However,…