Modern Listing Example
The Decline of Ransomware Attacks
Cyberint has compiled a report on the state of ransomware that reflects the incidents -…
Riskiest Connected Devices in Enterprise Networks
Forescout’s Vedere Labs today unveiled research into the riskiest IT, IoT, OT and IoMT devices…
The Race to Native Code Execution in PLCs
Using RCE to Uncover Siemens SIMATIC S7-1200/1500 Hardcoded Cryptographic Keys Written by Team82. Close to…
New “Emperor Dragonfly” Group Linked to Major Chinese Ransomware Family
Sygnia has released a new report uncovering that attacks led by the Night Sky and…
VMware Happy as Barry Chen Takes the Reins
VMware has announced today that Barry Chen will serve as Vice President and General Manager…
Key Attack Observations and Analysis from the First Half 2022
In the first half of 2022, the amount of DDoS (distributed denial of service) attacks…
Why Continuous Context Is the Only Way to Secure Complex Cloud Environments
By Richard Davies, Director AN/Z at Lacework. The cloud is just as complex as it…
Oxeye Warns of “SandBreak” vm2 Vulnerability
Oxeye has announced the discovery of a serious vm2 vulnerability that has received the maximum CVSS score…