Pinned Post

Latest Posts

Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability

Google has put out solutions to address a series of nine security flaws in its Chrome browser, including a new zero-day that has been exploited in t…

Cybercriminals Exploiting Microsoft's Quick Assist Feature in Ransomware Attacks

The Microsoft Threat Intelligence team says it has detected a threat actor it monitors under the moniker Storm-1811 utilizing the client management …

Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines

Security researchers have found roughly a dozen security holes affecting the GE HealthCare Vivid Ultrasound product line that may be used by malicio…

A SaaS Security Challenge: Getting Permissions All in One Place

Permissions in SaaS systems like Salesforce, Workday, and Microsoft 365 are incredibly accurate. They lay out precisely which users have access to w…

North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign

The North Korea-linked Kimsuky hacking gang has been ascribed to a new social engineering campaign that exploits bogus Facebook profiles to target…

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks

The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is tied to North Korea's Reconnaissance General Bureau (RGB), has bee…
Newest
Cookie Consent

We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.