Disclaimer:
The RSS blog posts featured on our website are external articles imported through an automated process. We do not verify the accuracy or completeness of the information contained in these posts. The views and opinions expressed in these articles are those of the authors and do not necessarily reflect our own. We are not responsible for any errors, omissions, or misstatements that may appear in these posts. Readers are advised to independently verify any information before relying on it.
If you find any information that you believe to be dangerous, harmful, inaccurate, or in violation of GDPR or other laws, please contact us immediately, and we will take steps to remove it.
Google TAG warns that Russian COLDRIVER APT is using a custom backdoor
Cyber Security BlogsGoogle warns that the Russia-linked threat actor COLDRIVER expands its targeting and is developing a custom malware. The ColdRiver APT (aka “Seaborgium“, “Callisto”, “Star Blizzard”, “TA446”) is a Russian cyberespionage group that has been targeting government officials, military personnel, journalists and think tanks since at least 2015. In the past, the group’s activity involved
- Published in RSS blog posts
N-able MDR ingests data from existing security and IT tools
Cyber Security Blogs N-able continues to advance its security suite with the launch of N-able Managed Detection and Response (MDR). This latest addition to the N-able security suite combines a powerful security operations platform with expert services, giving MSPs a broad range of capabilities to set a new standard of cybersecurity for their small and
- Published in RSS blog posts
Oleria raises $33 million to accelerate its product innovation
Cyber Security Blogs Oleria has raised $33.1 million in a Series A funding round. This latest investment, which brings the company’s total funding to over $40 million, is led by Evolution Equity Partners with participation from Salesforce Ventures, Tapestry VC, and Zscaler. This funding round enables Oleria to ramp up hiring to accelerate its product
- Published in RSS blog posts
Secrets Management Best Practices: Secure Cloud-native Development Series
Cyber Security BlogsBuild secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the fifth and final part of the series, and it will teach you to handle credentials and secrets management best practices for securing cloud-native applications. Every organization has their way of
- Published in RSS blog posts
ESET launches MDR service to improve cybersecurity for SMBs
Cyber Security Blogs ESET launched ESET MDR, an innovative solution aimed at addressing the evolving cybersecurity challenges faced by SMBs. This launch marks a significant stride in expanding ESET’s security services portfolio with another MDR solution. In a rapidly changing threat landscape, organizations seek MDR service providers to enhance their security postures, reduce false positives
- Published in RSS blog posts
Understanding the Essence of Cyber Hygiene Score and its Impact
Cyber Security Blogs In an era of technological advancements, the interconnectedness of digital systems has become an integral part of our daily lives. The dependence on digital networks has grown exponentially from personal communications to critical infrastructure. With this increased connectivity, however, comes a pressing need to ensure the security and integrity of our digital
- Published in RSS blog posts
The Risky Dilemma: Should you Calculate Risk Score vs Cyber Hygiene Score?
Cyber Security Blogs A single number to quantify your organization’s risk sounds like an interesting proposition, right? Risk Score, the idea of quantifying the entirety of your organization’s overall risk, is a popular concept in the cybersecurity industry that has been gaining traction over the years. From helping align and focus your mitigation efforts to
- Published in RSS blog posts
Google Fixes First Zero-Day Chrome vulnerability of 2024
Cyber Security Blogs On January 16, 2024, Google released a security patch to address CVE-2024-0519 an out-of-bound security vulnerability exploited in ongoing attacks . This patch specifically targets the first zero-day vulnerability discovered in the Chrome browser this year. A remote attacker can take advantage of the issue by fooling a user into opening a
- Published in RSS blog posts
PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts
Cyber Security BlogsExperts found multiple flaws, collectively named PixieFail, in the network protocol stack of an open-source reference implementation of the UEFI. Quarkslab researchers discovered nine vulnerabilities, collectively tracked as e PixieFAIL, affecting the IPv6 network protocol stack of EDK II, TianoCore’s open source reference implementation of UEFI. Unified Extensible Firmware Interface (UEFI) is a specification that
- Published in RSS blog posts
Swimlane enhances Turbine platform to alleviate the pressure on SecOps teams
Cyber Security Blogs Swimlane announced its new Turbine innovations, Canvas and Hero AI. This transformative combination empowers security teams to build automation in seconds with limitless integration possibilities, leading to dramatic time and resource savings. SecOps teams are drowning in a sea of alerts and evolving threats while facing a chronic shortage of qualified staff.
- Published in RSS blog posts







