The job of a SOC analyst has never been easy. Faced with an overwhelming flood of…
Category: Trending
HPE Investigating Breach Claims Involving Source Code: Report
Hewlett Packard Enterprise acknowledged it is investigating claims by a threat actor that reportedly involve theft…
Compromised AWS Keys Abused in Codefinger Ransomware Attacks
A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets…
Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks
Palo Alto Networks informed customers late last week that it has patched a zero-day vulnerability that…
HubPhish Abuses HubSpot Tools to Target 20,000 European Users for Credential Theft
Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim…
22,000 IPs Taken Down in Global Cybercrime Crackdown
More than 22,000 IP addresses linked to phishing, infostealer, and ransomware attacks were taken down in…
CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)
A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the…
Channel Women In Security: Understanding Risk In Digital Security
In the first episode of Channel Women in Security, Cass Cooper speaks with Rosanna Filingeri, Vice…
Ransomware Hits Critical Infrastructure Hard, Costs Adding Up
The financial impact of a cyberattack targeting a cyber-physical system (CPS) can reach up to $1…
Researcher Says Healthcare Facility’s Doors Hackable for Over a Year
A researcher says a US healthcare facility has failed to address a serious vulnerability that has…