Akira Ransomware Actors Exploit SonicWall Bug for RCE
CISA has added CE-2024-40766 to its known exploited vulnerabilities catalog. CISA has added CE-2024-40766 to its known exploited vulnerabilities catalog.…
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
A novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory (RAM) as…
300K Victims’ Data Compromised in Avis Car Rental Breach
Though the company reports that data was exfiltrated in the breach, it has been remained tightlipped regarding the kind of…
Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks
The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio Code software as…
Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT
The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the end goal of…
One More Tool Will Do It? Reflecting on the CrowdStrike Fallout
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that by deploying a firewall, antivirus…
How to Establish & Enhance Endpoint Security
Endpoint security has been around for decades, but changes in device use and the quick evolution of new attacks have…
Webinar: How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits
GenAI has become a table stakes tool for employees, due to the productivity gains and innovative capabilities it offers. Developers…