Apple fixes actively exploited FORCEDENTRY zero-day flaws
Apple released security patches to fix two zero-day vulnerabilities in iOS and macOS that are actively exploited in attacks in the wild. Apple rolled out security patches to fix a…
The FBI issued a flash alert for Hive ransomware operations
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The Federal Bureau of Investigation (FBI) has released a flaw alert…
New analysis of Diavol ransomware reinforces the link to TrickBot gang
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that…
Vice Society ransomware also exploits PrintNightmare flaws in its attack
Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice Society ransomware operators are actively exploiting Windows print spooler PrintNightmare…
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and…
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions…
The Silver Bullet for Ransomware’s Golden Goose
Ransomware is a hugely profitable business. The only way to end it is to stop criminals from making money off your data. By Elliot Lewis, Co-founder, and CEO of Keyavi Data Corp….
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez…
Takeaways from The Oldsmar Water Attack & What Security Leaders Can Do About It
With Real Examples & Screenshots of Cyber Attacks on Water & Wastewater Facilities By Michael Yehoshua, VP of Global Marketing, SCADAfence Over the last few months, cybersecurity journalists and the…
Maximizing the Impact of AI/ML Threat Detection Tools
By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise….
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle leaders faced last year. As we begin 2021, it’s important to remember…
The Importance Of Protecting Your App’s Source Code
By Rui Ribeiro, CEO and Co-founder, Jscrambler If your business operations involve any type of web or mobile app, it’s likely that the source code of these apps represents a…