10/30/2024 |
Midnight Blizzard Spear Phishing Intelligence Collection Campaign |
|
11/06/2024 |
Russian Midnight Blizzard Spear Phishing Campaign Targets Thousands Using RDP Files |
CPO Magazine |
10/31/2024 |
Russian Actor Midnight Blizzard Conducts Massive Spear-Phishing Campaign Using RDP Files |
InformationSecurityBuzz |
10/31/2024 |
Microsoft Threat Intelligence Update: How Midnight Blizzard Carried Out Spear-Phishing Using RDP Files |
Cyber Technology Insights |
10/30/2024 |
Midnight Blizzard Uses RDP to Target 100 Organizations in US, Europe |
SC World |
10/24/2024 |
macOS “HM Surf” vulnerability (CVE-2024-44133) |
|
10/24/2024 |
New MacOS vulnerability allows unauthorized data access |
Security Magazine |
10/02/2024 |
INC Ransomware attacks against healthcare |
|
10/02/2024 |
Security leaders discuss INC ransomware attacks targeting healthcare |
Security Magazine |
09/26/2024 |
CUPS(Common Unix Printing System) Remote Code Execution Vulnerabilty Disclosed |
|
09/27/2024 |
CUPS vulnerabilities put Linux systems at risk of remote code execution |
SC World |
09/27/2024 |
Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected |
Security Week |
09/27/2024 |
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution |
The Hacker News |
09/26/2024 |
Customer Advisory: New Remote Code Execution Vulnerability in printing facility (‘CUPS’) commonly found on Linux and similar systems |
Ontinue Resources |
09/11/2024 |
Lazarus Targets Developers |
|
09/11/2024 |
Lazarus Targets Developers with Sophisticated Coding Test Scam |
Secure World Magazine |
09/10/2024 |
1H 2024 Threat Intelligence Report |
|
10/31/2024 |
Return from the data fog: Scary security tales for Halloween |
Digital Journal |
10/31/2024 |
A Halloween Haunting: Unveiling Cybersecurity’s Scary Stats |
Information Security Buzz |
09/19/2024 |
China’s cyberattacks on manufacturing are part of its long-game strategy for industrial dominance |
SC Magazine |
09/16/2024 |
Cyberattacks against manufacturing sector increased 105% in H1 of 2024 |
Securitymagazine |
09/10/2024 |
Manufacturing, Industrial Sectors Are Under Siege |
Security Boulevard |
09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
PR Newswire |
09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
Global Security Mag |
09/10/2024 |
Attacks on manufacturing companies up 105 percent |
BetaNews |
09/10/2024 |
Key Findings from Ontinue’s 1H 2024 Threat Intelligence Report |
Ontinue Resources |
09/10/2024 |
1H 2024 Threat Intelligence Report |
Ontinue Resources |
07/25/2024 |
Github’s Stargazers Ghost Network |
|
07/25/2024 |
3,000 GitHub accounts found distributing malware |
SC Magazine |
06/31/2024 |
VMware ESXi Vulnerability |
|
06/31/2024 |
Record-Breaking $75 Million Ransom Paid To Dark Angels Gang |
Forbes.com |
04/27/2024 |
Public Talk BSides Cymru 2024 |
|
04/27/2024 |
Public Talk: Practical security challenges posed by AI adoption: Code Quality and Threat Modeling |
BSides Cymru, Watch on YouTube(soon) |
04/11/2024 |
Raspberry Robin Malware |
|
04/11/2024 |
Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics |
Secure World Magazine |
04/10/2024 |
Raspberry Robin Observed Spreading via Windows Script Files |
SC Magazine |
04/10/2024 |
Expert Panel: Ontinue 2024 Threat Report |
|
04/10/2024 |
Expert Panel Discussion |
Ontinue Resources |
03/19/2024 |
2023 Threat Intelligence Report |
|
03/19/2024 |
End of year Report - 2023 Threat Intelligence Report |
Ontinue Resources |
03/19/2024 |
Navigating the Complex Cybersecurity Landscape |
Ontinue Blog |
03/19/2024 |
Research Shows IT and Construction Sectors Hardest Hit By Ransomware |
Infosecurity Magazine |
03/19/2024 |
Threats Shaping the Cyber Threat Landscape |
VMBlog |
03/14/2024 |
Security Data Management |
|
03/14/2024 |
10 Tips for Better Security Data Management |
DarkReading |
02/23/2024 |
Red Teaming GenAI |
|
02/23/2024 |
Microsoft Unveils PyRIT, a Red Teaming Tool for Generative AI |
Techstrong.ai |
02/16/2024 |
RansomHouse using MrAgent to track deployment accross VMware ESXi hypervisors |
|
02/16/2024 |
‘MrAgent’ ransomware tool from RansomHouse Group targets ESXi servers |
SC Magazine |
02/08/2024 |
Linux Shim Vulnerability |
|
03/29/2024 |
Urgent Response: Linux Developers Swiftly Patch Critical Vulnerability in Shim |
NixOS Pro |
02/08/2024 |
Linux Devs Rush to Patch Critical Vulnerability in Shim |
Infosecurity Magazine |
01/22/2024 |
Mint SandStorm |
|
01/22/2024 |
Constantly Changing Threat Landscape - page 10 |
Channel Futures |
01/19/2024 |
Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns |
SecureWorld |
01/19/2024 |
Iran’s Mint Sandstorm Hits Universities with Hamas-Israel Phishing Scam |
Kilguard.net |
01/19/2024 |
Iran’s Mint Sandstorm APT Hits Universities with Hamas-Israel Phishing Scam |
HackRead |
01/18/2024 |
Mint Sandstorm targets high-profile Middle East researchers |
SC Magazine |
01/13/2024 |
FBot |
|
01/13/2024 |
What is FBot? |
Managed Service Provider Association of America |
01/12/2024 |
FBot Hacking Tool Targets Major Cloud Services |
SC Magazine |
01/13/2024 |
Ivanti Critical Patch |
|
01/05/2024 |
Ivanti Patches Critical Flaw in its EPM Software |
SC Magazine |
01/13/2024 |
JetBrains TeamCity Supply Chain Attack |
|
12/21/2023 |
The JetBrains TeamCity software supply chain attack: Lessons learned |
Security Boulevard |
12/21/2023 |
Jetbrains TeamCity Software Supply-chain Attack: A Sunburst Redux |
Reversing Labs |
01/10/2023 |
Data Breach Trends and Outlook January 2023 |
|
01/10/2023 |
Public Talk: Data Breach Trends and Outlook January 2023 |
ATED ICT Ticino, AIEA, ISACA Switzerland Chapter, ISACA Milan Chapter in collaboration with SUPSI Lugano |