February 27, 2024PressroomCloud security/threat intelligence The Five Eyes nations’ cybersecurity and intelligence agencies have released a joint advisory detailing the evolving tactics of the Russian state-sponsored threat actor known as…
Category: Cyber Security
4 Ways Organizations Can Drive Demand for Software Security Training
COMMENT While cybersecurity has always been a critical area for organizations that write their own software, we are rapidly approaching a near-perfect storm of various forces that are elevating the…
The open source Xeno RAT Trojan emerges as a potent threat on GitHub
February 27, 2024News about hackersMalware/Network Security A “complexly designed” remote access trojan (RAT) called Xenon RAT has been made available on GitHub, making it available to other actors at no…
What companies and CISOs should know about growing legal threats
A new era of litigation is threatening the cybersecurity community. In the last 18 months alone, Tesla is suing two former employees for cybersecurity violationsthe Federal Trade Commission (FTC) Successfully…
LiteSpeed WordPress plugin vulnerability puts 5 million sites at risk
February 27, 2024PressroomWebsite Vulnerabilities/Security A security vulnerability has been discovered in the LiteSpeed Cache plugin for WordPress that could allow unauthenticated users to escalate their privileges. Tracked as CVE-2023-40000the vulnerability…
Optiv is accepting applications for a $10,000 scholarship
PRESS RELEASE DENVER, February 21, 2024 /PRNewswire/ — Perfect, a leader in IT consulting and solutions, is accepting applications for its annual $10,000 scholarship for Black and African American students…
How to speed up SOC investigations
Processing alerts quickly and efficiently is the cornerstone of the role of a Security Operations Center (SOC) professional. Threat intelligence platforms can significantly improve their ability to do this. Let’s…
Delinea Acquires Fastpath to Revolutionize Privileged Access and Identity Governance
PRESS RELEASE SAN FRANCISCO, February 21, 2024 /PRNewswire/ — Outlinesleading provider of solutions that seamlessly extend Privileged Access Management (PAM), today announced a definitive agreement to acquire Fast route, a…
Hack The Box Launches Certified Web Exploitation Expert As Demand For Risk Mitigation Grows
PRESS RELEASE Hack The Box (HTB), the leading gamified cybersecurity upskilling, certification and talent assessment platform, has launched its latest hands-on certification offering, Hack The Box Certified Web Exploitation Expert…
WordPress Plugin Alert: Critical SQLi Vulnerability Threatens Over 200,000 Websites
February 27, 2024PressroomWebsite Security/Cryptojacking A critical security flaw has been found in a popular WordPress plugin called Ultimate Member that has more than 200,000 active installations. The vulnerability, tracked as…