by Beck Bailey | Feb 29, 2024 | RSS
Discover the key differences between a free VPN and a paid VPN and determine which one is right for your online privacy and security needs.
by Beck Bailey | Feb 29, 2024 | RSS
Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even in cases where mitigations have been applied against Golden SAML attacks. Silver SAML “enables the exploitation of SAML to launch attacks from an identity...
by Beck Bailey | Feb 29, 2024 | RSS
Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in telecom networks that are adjacent to GPRS roaming exchanges (GRX) The malware is novel in the fact that it leverages the GPRS Tunnelling Protocol (GTP) for...
by Beck Bailey | Feb 29, 2024 | RSS
As an IT leader, staying on top of the latest cybersecurity developments is essential to keeping your organization safe. But with threats coming from all around — and hackers dreaming up new exploits every day — how do you create proactive, agile cybersecurity...
by Beck Bailey | Feb 29, 2024 | RSS
The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the Windows Kernel as a zero-day to obtain kernel-level access and disable security software on compromised hosts. The vulnerability in question is CVE-2024-21338 (CVSS score:...
Recent Comments