Loading...
The day's top cybersecurity news and in-depth coverage
April 13, 2022
Sandworm succeeded in planting a new version of the Industroyer malware to disrupt ICS infrastructure at multiple levels, but was thwarted from doing serious damage. Read more â¶
This incident response template is built for IT teams and CISOs tasked with responding to security breaches or other incidents. It provides a step-by-step list of basic detection and response actions for IT teams to follow as they respond to and remediate incidents of various severities.
The now patched JekyllBot:5 vulnerabilities in Aethon TUG robots expose three communications interfaces, two APIs, and a websocket interface.
The action targeted devices infected by the Cyclops Blink malware, believed to have been developed by Russia's Sandworm group.
Phishing simulations aren't enough for identifying your organizationâs most vulnerable insiders or minimizing their risk.
SailPoint's IAM (identity access management) capabilities fill a gap in private equity firm Thoma Bravo's cybersecurity portfolio.
Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.
© 2024