Source
DARKReading
Sophisticated Windows and Linux malware for stealing data and conducting cyber espionage has flown under the radar, disguised as a cryptominer.
The threat actor exfiltrated 690GB of uncompressed data, or 767,035 files.
In the race over Citrix's latest vulnerability, the bad guys have a huge head start, with broad implications for businesses and critical infrastructure providers worldwide.
VMware vCenter Servers need immediate patch against critical RCE bug as race against threat actors begins.
The YoroTrooper group claims to be from Azerbaijan and even routes its phishing traffic through the former Soviet republic.
We have too much cybersecurity awareness. It's time to implement repeatable, real-world practice that ingrains positive habits and security behaviors.
A campaign targeting European governmental organizations and a think tank shows consistency from the low-profile threat group, which has ties to Belarus and Russia.
Cyber threats on satellite technology will persist and evolve. We need a comprehensive cybersecurity framework to protect them from attackers.
Organizations should focus on four key areas to advance employee education and "cyber smartness."