by Beck Bailey | Jan 25, 2024 | RSS
A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to deliver additional payloads onto compromised hosts for follow-on exploitation. Arctic Wolf Labs, which discovered the new attack tool in two recent intrusions, said...
by Beck Bailey | Jan 25, 2024 | RSS
Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett Packard Enterprise’s (HPE) cloud email environment to exfiltrate mailbox data. “The threat actor accessed and exfiltrated data beginning in May 2023...
by Beck Bailey | Jan 24, 2024 | RSS
The NCSC wants volunteers from the U.K.’s public and private sectors to join its new cybersecurity community.
by Beck Bailey | Jan 24, 2024 | RSS
See NCSC’s predictions for generative AI for cyber attack and defense through 2025.
by Beck Bailey | Jan 24, 2024 | RSS
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with a Google account to take control of a Kubernetes cluster. The critical shortcoming has been codenamed Sys:All by...
Recent Comments