Threat Intelligence

Why Cyber Leaders Trust MITRE ATT&CK for Evaluation and Guidance
Malware & Threats Why Cyber Leaders Trust MITRE ATT&CK for Evaluation and Guidance

In the rapidly evolving world of cybersecurity, maintaining an effective defense against ever-changing threats is an ongoing challenge that organizations must navigate. MITRE Engenuity's ATT&CK Evaluations have emerged as a crucial tool for cybersecurity leaders to assess their strategies

Are You Safe from Phishing Scams Exploiting Job Loss Fears?
Malware & Threats Are You Safe from Phishing Scams Exploiting Job Loss Fears?

A new phishing campaign has emerged, uniquely preying on widespread fears surrounding job security to trick recipients into downloading malware. This malicious scheme masquerades as a legal notice from the UK's Employment Tribunal, claiming that the recipient has been fired and must act

First Linux UEFI Bootkit Discovered, Marking Evolution in Malware Threats
Malware & Threats First Linux UEFI Bootkit Discovered, Marking Evolution in Malware Threats

In a groundbreaking development in cybersecurity, security researchers from ESET have uncovered the first-ever UEFI bootkit aimed at Linux systems, dubbed "Bootkitty." This discovery marks a significant shift in the landscape of UEFI bootkits, which were previously considered a threat

Is T-Mobile Winning the Battle Against Cyberattacks from China?
Malware & Threats Is T-Mobile Winning the Battle Against Cyberattacks from China?

In a world increasingly reliant on technology, cybersecurity has never been more critical, and T-Mobile US recently showcased a significant victory in this ever-evolving battle. The company announced measures that thwarted aggressive cyberattacks believed to be orchestrated by China's Salt

How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?
Malware & Threats How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?

In a recent campaign, the notorious Russia-aligned APT group RomCom exploited two zero-day vulnerabilities to deliver a backdoor to unsuspecting victims. The vulnerabilities in question were CVE-2024-9680 in Firefox and CVE-2024-49039 in Windows Task Scheduler. According to ESET researchers, these

Can Automation and Compliance Streamline Vulnerability Management?
Malware & Threats Can Automation and Compliance Streamline Vulnerability Management?

In today's rapidly evolving digital landscape, vulnerability management has become a critical concern for organizations. The increasing complexity of enterprise infrastructures, expanding attack surfaces, and the rising volume of vulnerabilities create a challenging environment for effective

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later