APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure
A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing…
Is the US Federal Government Increasing Cyber-Risk Through Monoculture?
In a monoculture, cybercriminals need to look for a weakness in only one product, or discover an exploitable vulnerability, to…
APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack
A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties…
Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day
A simple toggle in Proofpoint’s email service allowed for brand impersonation at an industrial scale. It prompts the question: Are…
Implementing Identity Continuity With the NIST Cybersecurity Framework
Having a robust identity continuity plan is not just beneficial but essential for avoiding financially costly and potentially brand-damaging outages.…
Webinar: Discover the All-in-One Cybersecurity Solution for SMBs
In today’s digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer…
New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication
Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS)…
Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal
Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These…