What is External Attack Surface Management
Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digitalRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Imagine trying to guard your home without knowing how many doors and windows it has, let alone which ones are unlocked. That’s the challenge many organizations face with their digitalRead More →
In December 2024, Arctic Wolf Labs uncovered a targeted campaign exploiting Fortinet FortiGate firewalls via publicly exposed management interfaces. This campaign enabled threat actors to gain unauthorized access, alter configurations,Read More →
In a move aimed at bolstering consumer cybersecurity, the Federal Communications Commission (FCC) has introduced the U.S. Cyber Trust Mark program. This voluntary initiative focuses on helping consumers identify InternetRead More →
Recent advancements in research and live demonstrations have brought to light a critical vulnerability in Microsoft’s BitLocker encryption technology, widely used to safeguard sensitive data. The vulnerability, tracked as CVE-2023-21563Read More →
Researchers from the University of the West Indies have uncovered critical vulnerabilities in the Wi-Fi Protected Access 3 (WPA3) protocol, exposing potential risks to networks believed to be highly secure.Read More →
In a new cyber threat exploiting ZIP file concatenation, attackers use a Trojan embedded in concatenated ZIP files to target Windows users, evading standard detection methods. This technique takes advantageRead More →
In a recent report, Unit 42 cybersecurity researchers from Palo Alto Networks have uncovered a sophisticated method called “Deceptive Delight,” highlighting the vulnerabilities of Large Language Models (LLMs) to targetedRead More →
A critical vulnerability, identified as CVE-2024-0132, has been discovered in NVIDIA’s AI infrastructure, affecting over 35% of cloud environments utilizing NVIDIA GPUs. This vulnerability targets the NVIDIA Container Toolkit andRead More →
In what appears to be a highly sophisticated cyber-physical operation targeting Hezbollah, new revelations have emerged about the potential involvement of Israel’s elite cyber intelligence unit, Unit 8200, in aRead More →
Ransomware groups are increasingly adopting new strategies for data exfiltration, with recent evidence pointing to the use of Microsoft’s Azure Storage Explorer for large-scale data theft. The trend, observed byRead More →