The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week announced the addition of eight more vulnerabilities to the list of security flaws known to be exploited in malicious attacks.
‘White Tur’ Hacking Group Borrows Techniques From Multiple APTs
A newly detailed threat actor has been observed employing various techniques borrowed from multiple advanced persistent threat (APT) actors, PwC’s cyber threat intelligence team reports.
Cyber Insights 2022: Improving Criminal Sophistication
OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks
Many of the ransomware attacks on industrial and critical infrastructure organizations result in the exposure of operational technology (OT) data that could be useful to threat actors, including to conduct cyber-physical attacks, according to Mandiant.
Cyberattacks Increasingly Hobble Pandemic-Weary US Schools
For teachers at a middle school in New Mexico’s largest city, the first inkling of a widespread tech problem came during an early morning staff call.
North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry
The North Korean threat group Lazarus was observed abusing the Windows Update client for the execution of malicious code during a campaign this month, Malwarebytes reports.
More Russian Attacks Against Ukraine Come to Light
The WhisperGate attack is not the only operation believed to have been conducted by Russia-linked threat actors against Ukraine in recent months. Symantec on Monday disclosed the details of an espionage operation that it has tied to a known group.
The Third Building Block for the SOC of the Future: Balanced Automation
When automation is balanced between humans and machines, we can ensure teams always have the best tool for the job
SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks
A series of vulnerabilities in 42Gears’ SureMDM device management products could have resulted in a supply chain compromise against any organization using the platform.
CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes
The U.S. Cybersecurity and Infrastructure Security Agency’s catalog of known exploited vulnerabilities can be useful not only for helping organizations patch high-risk vulnerabilities in their systems, but also to help them build or improve vulnerability management processes.













