Latest News
Stay up to date with the latest posts and updates
Alerts
-
Prometei Botnet Could Fire Up APT-Style Attacks
The malware is for now using exploits for the Microsoft Exchange “ProxyLogon” security bugs to install Monero-mining malware on targets.
4 min read
-
5 Fundamental But Effective IoT Device Security Controls
Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices.
4 min read
-
Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion
The U.S. Cybersecurity and Infrastructure Security Agency stated, “The threat actor connected to the entity’s network via a Pulse Secure virtual private network appliance, moved laterally to its…
4 min read
-
CISA Incident Response to SUPERNOVA Malware
Original release date: April 22, 2021 CISA has released AR21-112A: CISA Identifies SUPERNOVA Malware During Incident Response to provide analysis of a compromise in an organization’s enterprise network…
4 min read
-
Cyber Security Best Practices
Cyber Security Best Practices Many organizations struggle to keep their IT infrastructure secure and organized. One simple security measure that we at DefendEdge strongly recommend to all our…
4 min read
-
4 Innovative Ways Cyberattackers Hunt for Security Bugs
David “moose” Wolpoff, co-founder and CTO at Randori, talks lesser-known hacking paths, including unresolved “fixme” flags in developer support groups.
4 min read