A new cyber attack campaign is leveraging the PowerShell script associated with a legitimate red teaming tool to plunder NTLMv2 hashes from...
New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass endpoint security solutions by manipulating the...
Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN...
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that...
Fortinet announced on Monday that it has completed the acquisition of the enSilo endpoint security service, based in San Francisco. By acquiring...
Defining Data Exfiltration Also referred to as data theft or exportation, data exfiltration is when an unauthorized transfer of data occurs from...
A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you’re protected right now. What do...
In the world of technology, just as in any other sphere of life, things that were once in vogue have become outdated,...
A critical remote execution vulnerability in Microsoft remote desktop services enables let attackers compromise the vulnerable system with WannaCry level malware. Microsoft...
Most small businesses just rely on an antivirus tool to mitigate cyber risks, despite the fact that hackers show an increasing tendency...
Endpoint security is of critical importance to all kinds of organizations, big and small. As organizations all around the world get attacked...
Wazuh is a security detection, visibility, and compliance open source project. It was born as a fork of OSSEC HIDS, later was...