“The in-the-wild attacks successively targeted three European companies active in the defense sector,” researchers added. “Although…
Category: Insights
UN agreement on cybercrime criticized over risks to cybersecurity researchers
“The good news here is that after five long years of negotiation, certain basics like making…
Critical Microsoft WSUS flaw exploited in wild after insufficient patch
“Starting around 2025-10-23 23:34 UTC, Huntress observed threat actors targeting WSUS instances publicly exposed on their…
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
However, Roger Grimesdata-driven defense CISO advisor at KnowBe4, said it’s “far from” the oddest phishing lure…
The best IAM tools
Manage identities in hybrid and multi-cloud environments control privileged accounts, Analyze login patterns based on risk…
The 10 biggest issues CISOs and cyber teams face today
“What’s occupying a ton of time for CISOs today is competing priorities,” he says. “The threat…
Data sovereignty proof: How to verify controls like ‘Project Texas’
“Sovereignty isn’t just a region on a map — it’s an operating model. The hard part…
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
He added, Agenda Ransomware exploits Windows-centric assumptions, under-protected RMM tools, and neglected driver monitoring. Most organizations…
Europol disrupts network behind 49 million fake accounts
On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided…
Risks of recovering from ransomware attacks
“The 60 percent recovery rate reflects several technical and operational realities that regularly arise when responding…