Ransomware Task Force Publishes Framework to Fight Global Threat
An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model. ...
New Threat Group Carrying Out Aggressive Ransomware Campaign
UNC2447 observed targeting now-patched vulnerability in SonicWall VPN. ...
MITRE Adds MacOS, More Data Types to ATT&CK Framework
Version 9 of the popular threat matrix will improve support for a variety of platforms, including cloud infrastructure. ...
Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks
An "aggressive" financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called...
A New Slack channel for Cybersecurity Leaders Outside of the Fortune 2000
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant...
Microsoft Finds 'BadAlloc' Flaws Affecting Wide-Range of IoT and OT Devices
Microsoft researchers on Thursday disclosed two dozen vulnerabilities affecting a wide range of Internet of Things (IoT) and Operational Technology (OT) devices used in industrial, medical, and enterprise networks that could...
Here's A New Forum for Cybersecurity Leaders Outside of the Fortune 2000
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant...
Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach
Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor. "We have...
XDR Pushing Endpoint Detection and Response Technologies to Extinction
Ironically, EDR's success has spawned demand for technology that extends beyond it. ...
Researchers Connect Complex Specs to Software Vulnerabilities
Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link. ...