How Can Organizations Navigate SEC’s Cyber Materiality Disclosures?
Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.…
RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks
A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to terminate endpoint…
Identity Threat Detection and Response Solution Guide
The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response (ITDR) has emerged as a critical component…
New Cyber Threat Targets Azerbaijan and Israel Diplomats, Stealing Sensitive Data
A previously unknown threat actor has been attributed to a spate of attacks targeting Azerbaijan and Israel with an aim…
GitHub Vulnerability ‘ArtiPACKED’ Exposes Repositories to Potential Takeover
A newly discovered attack vector in GitHub Actions artifacts dubbed ArtiPACKED could be exploited to take over repositories and gain…
New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining
Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that’s targeting machines with weak SSH passwords to ultimately…
Ransomware Group Behind Major Indonesian Attack Wears Many Masks
Brain Cipher made a loud entry to the ransomware scene, but it doesn’t seem to be quite as sophisticated as…
‘EastWind’ Cyber-Spy Campaign Combines Various Chinese APT Tools
The likely China-linked campaign is deploying CloudSorcerer and other proprietary binaries belonging to known state-sponsored groups, showing how advanced persistent…