How to capture forensic evidence for Microsoft 365

Enterprise security has never been a box-checking exercise, but the…

CrowdStrike cuts 500 jobs in AI pivot, but flags risks

Cybersecurity giant CrowdStrike is cutting 500 jobs, or 5% of…

Cisco IOS XE Vulnerability Allows Attackers to Gain Elevated Privileges

Cisco has issued an urgent security advisory (ID: cisco-sa-iosxe-privesc-su7scvdp) following…

Nmap 7.96 Released with Enhanced Scanning Capabilities and Updated Libraries

The popular network mapping and security auditing tool Nmap has…

CISA warns of cyberattacks targeting the US oil and gas infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA), along with the…

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning…

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

StealC, a notorious information stealer and malware downloader first sold…

Gootloader Malware Attacking Users Via Google Search Ads Using Weaponized Documents

The notorious Gootloader malware has reemerged with evolved tactics, now…

CrowdStrike cuts 500 jobs in AI pivot, but flags risks

Cybersecurity giant CrowdStrike is cutting 500 jobs, or 5% of…

PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation

A security vulnerability, tracked as CVE-2024-53141, has recently come to light…

Neurohacks to outsmart stress and make better cybersecurity decisions

Cybersecurity is one of the most high-stress professions in the world — and it’s only worsening. According to ISACA’s 2024 State of Cybersecurity survey, 60% […]