Security News

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever
2024-10-23 16:15

It only takes five days on average for attackers to exploit a vulnerability, according to a new report.

Evolving cloud threats: Insights and recommendations
2024-10-23 04:00

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by leveraging...

THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 - Oct 20)
2024-10-21 11:11

Hi there! Here’s your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems we thought were secure—like finding hidden doors in locked houses. But the...

Volkswagen monitoring data dump threat from 8Base ransomware crew
2024-10-16 21:30

The German car giant appears to be unconcerned The 8Base ransomware crew claims to have stolen a huge data dump of Volkswagen files and is threatening to publish them, but the German car giant...

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024
2024-10-16 19:00

A new report reveals a 2024 surge in mobile, IoT, and OT cyberattacks, highlighting key trends and the need for zero-trust security.

5 Techniques for Collecting Cyber Threat Intelligence
2024-10-16 09:28

To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly expanding your knowledge about new and ongoing threats. There are...

THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 - Oct 13)
2024-10-14 10:43

Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and trust me, you NEED to be in the loop this time. We've got everything from zero-day exploits and AI gone...

OpenAI confirms threat actors use ChatGPT to write malware
2024-10-12 14:09

OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and developing malware, spreading misinformation, evading detection, and conducting...

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
2024-10-11 08:34

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has observed threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic...

How open source SIEM and XDR tackle evolving threats
2024-10-09 16:07

Evolving threats require security solutions that match the sophistication of modern threats. Learn more about how Wazuh, the open-source XDR and SIEM, tackles these threats. [...]