Various malware strains deployed via Foxit PDF Reader exploit
Attacks exploiting a design vulnerability in the Foxit PDF reader have been launched by various threat actors to facilitate the delivery of several malicious payloads, including Agent Tesla, Remcos RAT, AsyncRAT, and XWorm, among others, reports The...
Major cloud platforms at risk of critical Fluent Bit vulnerability
Microsoft Azure, Google Cloud Platform, Amazon Web Services, and other major cloud providers and technology firms could be compromised in attacks leveraging the critical memory corruption flaw within the widely used logging and metrics software...
OpenSSF Siren to Share Threat Intelligence for Open Source Software
The Siren email mailing list will focus on operational impact and response, acting as a central location to provide information about threats and necessary post-disclosure activities.
Faced with chilling new SEC rules, chief information security officers are learning soft skills to help them better communicate cybersecurity concerns with the C-suite.
CyberArk Picks Up Machine Identity Manager Venafi For $1.54B
The acquisition gives CyberArk new IoT identity and certificate lifecycle management, cryptographic code-signing, and other services to secure the enterprise cloud.