Today, most Network Detection and Response (NDR) solutions rely on traffic mirroring and Deep Packet Inspection (DPI). Traffic mirroring is…
Read More »Cyber security
Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming…
Read More »Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments.…
Read More »The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian government organizations with trojanized versions…
Read More »The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in…
Read More »A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between the threat…
Read More »The operators of RomCom RAT are continuing to evolve their campaigns with rogue versions of software such as SolarWinds Network…
Read More »Multiple vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software that could be chained together by an unauthenticated, remote…
Read More »A previously undocumented Android spyware campaign has been found striking Persian-speaking individuals by masquerading as a seemingly harmless VPN application.…
Read More »The OpenSSL project has rolled out fixes to contain two high-severity flaws in its widely used cryptography library that could…
Read More »