'Earth Minotaur' Exploits WeChat Bugs, Sends Spyware to Uyghurs
The emerging threat actor, potentially a Chinese state-sponsored APT, is using the known exploit kit Moonshine in cross-platform attacks that deliver a previously undisclosed backdoor called "DarkNimbus" to ethnic minorities, including Tibetans.
Vulnerability Management Challenges in IoT & OT Environments
By understanding the unique challenges of protecting IoT and OT devices, organizations can safeguard these critical assets against evolving cyber threats.
African Law Enforcement Nabs 1,000+ Cybercrime Suspects
Authorities across 19 African countries also dismantled their infrastructure and networks, thanks to cooperation between global law enforcement and private firms.
Compromised Software Code Poses New Systemic Risk to U.S. Critical Infrastructure
New Fortress Information Security research shows 90% of software products used by critical infrastructure organizations contain code developed in China.
CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat
Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.
Without validation, exposure management is just a half measure
As CTEM practices become increasingly widespread, security vendors have rushed to position themselves as exposure management providers — but a closer examination reveals that many of them have adopted a partial approach.