EPSS vs. CVSS: What’s the Best Approach to Vulnerability Prioritization?

26/09/2024 0 Comments 0 tags

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks

26/09/2024 0 Comments 0 tags

Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE and FPSpy. The activity has been attributed to an adversary tracked as Kimsuky,

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar

26/09/2024 0 Comments 0 tags

Imagine trying to find a needle in a haystack, but the haystack is on fire, and there are a million other needles you also need to find. That’s what dealing

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

26/09/2024 0 Comments 0 tags

An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

26/09/2024 0 Comments 0 tags

Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

25/09/2024 0 Comments 0 tags

Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

25/09/2024 0 Comments 0 tags

Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

25/09/2024 0 Comments 0 tags

Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature

Expert Tips on How to Spot a Phishing Link

25/09/2024 0 Comments 0 tags

Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it’s too late. See these key indicators

Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises

25/09/2024 0 Comments 0 tags

Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of