Embarking on a Compliance Journey? Here’s How Intruder Can Help

30/10/2024 0 Comments 0 tags

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria

Dutch Police Disrupt Major Info Stealers RedLine and MetaStealer in Operation Magnus

29/10/2024 0 Comments 0 tags

The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked as RedLine and MetaStealer. The takedown, which took place on

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

29/10/2024 0 Comments 0 tags

A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution

A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

29/10/2024 5 Comments 0 tags

Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth. His philosophy is plain yet brilliant: “When

U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

29/10/2024 0 Comments 0 tags

The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the threat intelligence information shared between the private sector, individual researchers,

New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors

29/10/2024 0 Comments 0 tags

More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found that the latest AMD and Intel processors are still susceptible

Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

28/10/2024 0 Comments 0 tags

A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive Panda that infected them with a previously undocumented post-compromise toolset

Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes

28/10/2024 0 Comments 0 tags

Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized and automated at a rapid pace, ushering in new types

Russian Espionage Group Targets Ukrainian Military with Malware via Telegram

28/10/2024 0 Comments 0 tags

A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to target the Ukrainian military under the Telegram persona Civil Defense.

BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers

28/10/2024 0 Comments 0 tags

Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called BeaverTail, a JavaScript downloader and information stealer linked to an