AI Solutions Are the New Shadow IT
By:
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough...
Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions
By:
Nov 21, 2023NewsroomCyber Attack / Cyber Espionage
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the...
Play Ransomware Goes Commercial – Now Offered as a Service to Cybercriminals
By:
Nov 21, 2023NewsroomRansomware-as-a-service
The ransomware strain known as Play is now being offered to other threat actors "as a service," new evidence unearthed by Adlumin has revealed.
"The unusual lack...
Product Walkthrough: Silverfort’s Unified Identity Protection Platform
By:
In this article, we will provide a brief overview of Silverfort's platform, the first (and currently only) unified identity protection platform on the market. Silverfort's patented technology aims...
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks
By:
Nov 18, 2023NewsroomCyber Attack / USB Worm
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifter in...
CISA Sets a Deadline – Patch Juniper Junos OS Flaws Before November 17
By:
Nov 14, 2023NewsroomCyber Attack / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given a November 17, 2023, deadline for federal agencies and organizations to apply mitigations...
New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas Attacks
By:
Nov 13, 2023NewsroomCyber Warfare / Malware
Cybersecurity researchers have warned about a Windows version of a wiper malware that was previously observed targeting Linux systems in cyber attacks aimed...
New Ransomware Group Emerges with Hive’s Source Code and Infrastructure
By:
Nov 13, 2023NewsroomCyber Threat / Malware
The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the now-dismantled Hive operation...
Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-Baltistan
By:
Nov 10, 2023NewsroomPrivacy / Cyber Espionage
Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of a watering hole...
Iran-Linked Imperial Kitten Cyber Group Targeting Middle East’s Tech Sectors
By:
Nov 10, 2023NewsroomCyber Attack / Cyber Threat
A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October 2023 amid...