The U.S. Cybersecurity and Infrastructure Security Agency has added two more flaws to its catalog of Known...
Compromised
Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means...
Risk actors are significantly abusing Internet Details Services (IIS) extensions to backdoor servers as a means of...
Cybersecurity researchers have reiterated similarities involving the hottest iteration of the LockBit ransomware and BlackMatter, a rebranded...
Netwrix IT asset tracker and compliance auditor, used across more than 11,500 organizations, contains a critical Insecure...