THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)
Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me,…
Identity illuminated
Hey there, it’s your weekly dose of “what the heck is going on in cybersecurity land” – and trust me,…
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt…
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to…
Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by…
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and…
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel…
The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly…
Companies are putting “AI” in just about all of their products, which opens up new security holes. LLM SecOps and…
The hotel giant will be held to higher security standards in a series of proposed requirements, including implementing a new…