New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the...
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the...
Sep 12, 2025Ravie LakshmananVulnerability / Cyber Espionage The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical...
Most mobile apps silently leak personal data to third parties, even trusted ones. From trackers in Google Play apps to...
Roasting Redmond for Kerberoasting: “Like an arsonist selling firefighting services,” quips this 76-year-old. The post Microsoft’s ‘Gross Cybersecurity Negligence Threatens...
Artificial intelligence is no longer just another tool in the cybersecurity stack—it’s becoming a requirement to keep pace with modern...
Fletcher Heisler, CEO of Authentik Security, covers the evolution of Identity and Access Management (IAM) and its significance in modern...
Permiso researchers uncovered a Unicode obfuscation technique, “Inboxfuscation,” that exploits Microsoft Exchange inbox rules to evade detection and exfiltrate email...
For the second time in two years, Senator Ron Wyden is asking federal regulators to investigate Microsoft's cybersecurity practices, saying...
If you’ve been anywhere near cybersecurity leadership circles lately, you’ve probably heard the acronym CTEM tossed around a lot. Continuous...
The FBI warns of the “Phantom Hacker” scam that has stolen over $1B by tricking victims—often seniors—into moving funds to...
Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node...
Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to...
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote...
Lasso has launched an agentic AI service for purple teaming that secures AI applications before and after deployment. By combining...
As organizations mature their cybersecurity, their capabilities related to each of these three pillars deepen and strengthen. Stage one: Reactive...