The New 80/20 Rule for SecOps: Customize Where it Matters, Automate the Rest

10/11/2023 0 Comments 0 tags

There is a seemingly never-ending quest to find the right security tools that offer the right capabilities for your organization. SOC teams tend to spend about a third of their day on

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

09/11/2023 0 Comments 0 tags

Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting Israel. “The framework’s web component is written in the Go programming language,” Deep

Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability

09/11/2023 0 Comments 0 tags

The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in SysAid IT support software in limited attacks, according to new findings from

New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers

09/11/2023 0 Comments 0 tags

A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate a malicious installer for a popular system profiling tool called CPU-Z. “This

When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules

09/11/2023 0 Comments 0 tags

While intended for convenience and efficient communication, email auto-forwarding rules can inadvertently lead to the unauthorized dissemination of sensitive information to external entities, putting confidential data at risk of exposure

CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation

09/11/2023 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol (SLP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Researchers Uncover Undetectable Crypto Mining Technique on Azure Automation

08/11/2023 0 Comments 0 tags

Cybersecurity researchers have developed what’s the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without racking up any charges. Cybersecurity company SafeBreach said it discovered three different methods

WhatsApp Introduces New Privacy Feature to Protect IP Address in Calls

08/11/2023 0 Comments 0 tags

Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called “Protect IP Address in Calls” that masks users’ IP addresses to other parties by relaying the calls

Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPI

08/11/2023 0 Comments 0 tags

A new set of malicious Python packages has slithered their way to the Python Package Index (PyPI) repository with the ultimate aim of stealing sensitive information from compromised developer systems.

Guide: How vCISOs, MSPs and MSSPs Can Keep their Customers Safe from Gen AI Risks

08/11/2023 0 Comments 0 tags

Download the free guide, “It’s a Generative AI World: How vCISOs, MSPs and MSSPs Can Keep their Customers Safe from Gen AI Risks.” ChatGPT now boasts anywhere from 1.5 to