Latest News
Stay up to date with the latest posts and updates
Alerts
-
Using Aviary to Analyze Post-Compromise Threat Activity in M365 Environments
Original release date: April 8, 2021 Aviary is a new dashboard that CISA and partners developed to help visualize and analyze outputs from its Sparrow detection tool released…
4 min read
-
Azure Functions Weakness Allows Privilege Escalation
Microsoft’s cloud-container technology allows attackers to directly write to files, researchers said.
4 min read
-
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks
Industrial enterprises in Europe are target of campaign, which forced a shutdown of industrial processes in at least one of its victims’ networks, according to researchers.
4 min read
-
Facebook: Stolen Data Scraped from Platform in 2019
The flaw that caused the leak of personal data of more than 533 million users over the weekend no longer exists; however, the social media giant still faces…
4 min read
-
Critical Cloud Bug in VMWare Carbon Black Allows Takeover
CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual servers and workloads that they contain.
4 min read
-
SAP Bugs Under Active Cyberattack, Causing Widespread Compromise
Cyberattackers are actively exploiting known security vulnerabilities in widely deployed, mission-critical SAP applications, allowing for full takeover and the ability to infest an organization further.
4 min read