A recently identified ransomware operation called Buhti is using LockBit and Babuk variants to target both…
Google Cloud Users Can Now Automate TLS Certificate Lifecycle
Google on Thursday announced the availability of its Automatic Certificate Management Environment (ACME) API for all…
Watch Now: Threat Detection and Incident Response Virtual Summit
All sessions from SecurityWeek’s Threat Detection & Incident Response Summit are now available to watch on demand. This…
New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
Mandiant on Thursday detailed a new piece of malware that appears to be linked to Russia…
New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…
AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since…
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is…
Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a…
Barracuda Discloses Breach Of Some Email Security Customers Due To Zero-Day Vulnerability
Barracuda said that some Email Security Gateway customers were impacted by a breach last week that…
Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance
According to a research report by security vendor Qualys, on average, a software vulnerability in 2022…