More than 1000 businesses from around the world have reportedly been impacted in a supply-chain attack targeting Kaseya software.
As many as 40 million Dell devices are vulnerable to targeted man-in-the-middle attacks. Dell advises BIOS/UEFI updates.
Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.
Three weeks after releasing patches for a critical vulnerability in VMware vCenter, thousands of servers remain vulnerable to attacks.
This newly discovered malware is the first to take advantage of an obscure Windows container escape technique to seek out and infect Kubernetes clusters.
Known and unknown groups are using VPN vulnerabilities to circumvent authentication and establish backdoors.
The FBI has been deleting backdoors placed by cyber espionage group Hafnium on Microsoft Exchange servers, signalling a more active defence approach.
Data poisoning involves tampering with and polluting a machine learning model's training data, impacting the ability to produce accurate predictions.
The Golden Chickens cyber criminal gang is believed to sell its more_eggs backdoor for campaigns executed using information from LinkedIn profiles.
Attackers were able to place malicious code in the PHP central code repository, forcing changes to the PHP Group's infrastructure.
Magic WAN and Magic Firewall aim to simplify linking sites and data centres while allowing organisations to better enforce security policies.
Ryuk attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
Aims to improve performance of FHE to make it practical for business and government to better protect confidential data in the cloud.
The Linux Foundation's sigstore code-signing software, developed with IBM and Red Hat, will help prevent attacks on the software supply chain