Threat Intelligence
-
TikTok Banned on Govt. Devices; Will Private Sector Follow Suit?
Texas this week become the fifth US state to ban the TikTok app on government-owned devices over concerns about the…
-
3 Ways Attackers Bypass Cloud Security
BLACK HAT EUROPE 2022 – London – CoinStomp. Watchdog. Denonia. These cyberattack campaigns are among the most prolific threats today…
-
Google: Use SLSA Framework for Better Software Security
Organizations should implement the Supply Chain Levels for Software Artifacts (SLSA) framework when building software to ensure better software security…
-
Iranian APT Targets US With Drokbk Spyware via GitHub
A subgroup of the state-backed Iranian threat actor Cobalt Mirage is using a new custom malware dubbed “Drokbk” to attack…
-
Report: Air-Gapped Networks Vulnerable to DNS Attacks
Common misconfigurations in how Domain Name System (DNS) is implemented in an enterprise environment can put air-gapped networks and the…
-
Interpres Security Emerges from Stealth to Help Companies to Optimize Security Performance
CHARLESTON, S.C., Dec. 8, 2022 /PRNewswire/ — Interpres Security, a company dedicated to helping companies optimize their security performance with…
-
Fraudsters Siphon $360M From Retailers Using 50M Fake Shoppers
Online fraudsters posing as consumers likely siphoned off more than $360 million from the marketing budgets of online businesses by…
-
Rackspace Incident Highlights How Disruptive Attacks on Cloud Providers Can Be
A Dec. 2 ransomware attack at Rackspace Technology — which the managed cloud hosting company took several days to confirm…
-
Russia Readies Winter Cyberattacks As Troops Retreat From Ukraine
With a beleaguered and retreating Russian military, analysts warn that winter’s chill will be accompanied by a new barrage of…