New details have emerged on the China-linked breach disclosed by the U.S. Treasury Department earlier this…
Category: Prime
LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers
A proof-of-concept (PoC) exploit has been released for a now-patched security flaw impacting Windows Lightweight Directory Access Protocol…
New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber…
CrowdStrike Seeks Dismissal For Most Of Delta Lawsuit Claims
CrowdStrike petitioned a Georgia court Monday to dismiss nearly all claims in Delta’s lawsuit over the…
Arctic Wolf To Acquire Cylance Assets From BlackBerry For $160M
Arctic Wolf said Monday it will enhance its security operations platform with the planned acquisition of…
CISA Seeking Public Comment on Updated National Cyber Incident Response Plan
The US cybersecurity agency CISA has released a draft version of its updated National Cyber Incident…
Schneider Electric Investigating Security ‘Incident’ After Reported Hacker Claims
Schneider Electric confirmed Monday that a developer platform used by the company was impacted by a…
Cynomi Hires Security Vet Ken Marks As CRO To Drive vCISO Platform Growth
Cynomi, an MSP-focused startup whose vCISO platform is tailored toward securing small and medium-sized enterprises, announced…
New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers
Over 1,500 Android devices have been infected by a new strain of Android banking malware called…
Leveraging Wazuh for Zero Trust security
Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously…