RansomwareNew Lockbit-linked ransomware group targets Fortinet vulnerabilitiesThe “SuperBlack” ransomware leverages the LockBit 3.0 builder with a custom encryption tool.
Network SecurityMicrosoft’s March Patch Tuesday fixes 67 flaws, including 6 zero-daysMicrosoft addressed security vulnerabilities across its various offerings, including Windows and Office.
Cloud SecurityHow to plan your cloud migration with security in mindTo protect your cloud-based assets, your organization must consider security and compliance when planning your cloud migration journey.
Vulnerability ManagementVMware flaws exploited in the wild; Broadcom releases patchesVMware ESX, VMware vSphere, VMware Cloud Foundation, or VMware Telco Cloud Platform are affected.
Network SecurityOpenSSF sets baseline security standards for Linux-based softwareNew standards seen as a good move, but some worry it may breed complacency in security.
Cloud SecurityUnpack the stack: Understanding modern AI security challenges during cloud migrationHere are key security elements to prioritize when migrating your AI stack to the cloud.
Network SecurityAttackers achieving network intrusions in just under 4.5 hoursWhile attackers are moving faster across networks, they still rely on old methods such as phishing.
Network SecuritySonicWall, Palo Alto Networks flaws under attack, added to CISA listThe critical SonicOS SSLVPN flaw and high-severity PAN-OS flaw both risk authentication bypass.
IdentityNew identity challenges demand new security toolsThe importance of identity security has become painfully apparent for security professionals as threat actors focus on phishing and other identity-based attacks to penetrate networks.
Vulnerability ManagementOpenSSH flaws could enable man-in-the-middle attacks, denial of serviceIf the VerifyHostKeyDNS option is activated, an attacker could impersonate a server to hijack SSH sessions.
Build a vulnerability management program with internet exposure in mindAaron Unterberger February 5, 2025