Five Things To Know On The ‘Major’ US Treasury Department Hack

New details have emerged on the China-linked breach disclosed by the U.S. Treasury Department earlier this…

LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers

A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol…

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber…

CrowdStrike Seeks Dismissal For Most Of Delta Lawsuit Claims

CrowdStrike petitioned a Georgia court Monday to dismiss nearly all claims in Delta’s lawsuit over the…

Arctic Wolf To Acquire Cylance Assets From BlackBerry For $160M

Arctic Wolf said Monday it will enhance its security operations platform with the planned acquisition of…

CISA Seeking Public Comment on Updated National Cyber Incident Response Plan

The US cybersecurity agency CISA has released a draft version of its updated National Cyber Incident…

Schneider Electric Investigating Security ‘Incident’ After Reported Hacker Claims

Schneider Electric confirmed Monday that a developer platform used by the company was impacted by a…

Cynomi Hires Security Vet Ken Marks As CRO To Drive vCISO Platform Growth

Cynomi, an MSP-focused startup whose vCISO platform is tailored toward securing small and medium-sized enterprises, announced…

New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called…

Leveraging Wazuh for Zero Trust security

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously…