cyber security

Hackers Use Number of Legitimate Tools in Ransomware Attacks

Ransomware attacks remain a formidable challenge for organizations worldwide. These attacks not only encrypt critical data, rendering it inaccessible to…

1 year ago

NSA Details Seven Pillars Of Zero Trust

The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization's network…

1 year ago

OpenNMS XSS Flaw Let Attackers Inject JavaScript Payload

A critical vulnerability in OpenNMS, a widely used network monitoring solution, has been identified, allowing attackers to inject malicious JavaScript…

1 year ago

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…

1 year ago

RA World Ransomware Attack Windows Using Hacked Domain Control & Anti-AV Tactics

Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. …

1 year ago

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects…

1 year ago

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials

Threat actors employ phishing scams to trick individuals into giving away important details like login credentials or financial data.  It…

1 year ago

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers used the Golden SAML attack in…

1 year ago

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled its latest iteration, version 4.14, introducing…

1 year ago

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure sensitive data and communications, making them…

1 year ago