We talk about all the latest news and information about incident response in this section. This includes changes to strategies, tools, and best practices for handling and reducing security incidents. Find out about recent high-profile events, new trends in how to respond, and what experts in the field have to say. The goal of our coverage is to give companies useful information that will help them deal with and recover from security breaches and cyberattacks.
wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By manipulating its capabilities, attackers can execute…
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…
ToddyCat is an APT group that has been active since December 2020, and primarily it targets the government and military…
Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass…
In 2022, HardBit Ransomware emerged as version 4.0. Unlike typical ransomware groups, this ransomware doesn't use leak sites or double…
Multiple international cybersecurity agencies jointly warn of a PRC state-sponsored cyber group, linked to the Ministry of State Security and…
Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,…
SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a threat actor to read sensitive files…
Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting…
A new vulnerability has been unearthed, allowing attackers to gain rootkit-like abilities on Windows systems without requiring administrative privileges. Dubbed…