How to capture forensic evidence for Microsoft 365

Enterprise security has never been a box-checking exercise, but the…

How To Secure Digital Wallets from Phishing Attacks

Digital wallets have become increasingly popular, offering users an easy…

OpenCTI: Free Cyber Threat Intelligence Platform for Security Experts

OpenCTI (Open Cyber Threat Intelligence) stands out as a free,…

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots

 Cisco has issued an urgent security advisory (cisco-sa-twamp-kV4FHugn) warning of…

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware

The Russia-linked threat actor known as COLDRIVER has been observed…

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to…

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning…

CrushFTP Vulnerability Exploited in Attacks Following PoC Release

Security researchers have confirmed active exploitation attempts targeting the critical…

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure,…

Attackers Ramp Up Efforts Targeting Developer Secrets

Software teams need to follow security best practices to eliminate…

Top 5 Cybersecurity News Articles for the Week of December 22, 2024

As we approach the end of 2024, the cybersecurity landscape has been marked by significant events and emerging trends that will shape the future of […]