APT groups increasingly attacking cloud services to gain command and control
GoGra leverages the Microsoft Graph API in order to access the Outlook mail service using OAuth access tokens for a
Continue readingGoGra leverages the Microsoft Graph API in order to access the Outlook mail service using OAuth access tokens for a
Continue readingAug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick
Continue readingThe idiosyncratic use of AI within organizations is a problem when it comes to risk. Instead, AI deployment must be
Continue readingWith software vulnerabilities being exploited at an alarming rate, the Defense Advanced Research Projects Agency’s (DARPA) AI Cyber Challenge (AIxCC)
Continue readingWhile the Black Hat USA 2024 conference, held in Las Vegas, has served as a launchpad for several cybersecurity tools and
Continue reading“Certain events must be tapped into at the kernel level and responded to accordingly, but the whole signature matching process
Continue readingBBC News cybersecurity journalist Joe Tidy has found himself in the unusual position of being targeted by a scammer calling
Continue readingAug 07, 2024Ravie LakshmananCybersecurity / Incident Response Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor
Continue readingAug 07, 2024Ravie LakshmananCloud Security / Cyber Espionage An unnamed media organization in South Asia was targeted in November 20233
Continue readingManagers in UK organizations are getting better at understanding online safety best practice, but their skills are not necessarily matched
Continue reading