RansomwareNew Lockbit-linked ransomware group targets Fortinet vulnerabilitiesThe “SuperBlack” ransomware leverages the LockBit 3.0 builder with a custom encryption tool.
Network SecurityMicrosoft’s March Patch Tuesday fixes 67 flaws, including 6 zero-daysMicrosoft addressed security vulnerabilities across its various offerings, including Windows and Office.
Security OperationsNew research reveals flaws in security team performance metrics IDC's survey of 900 security leaders reveals widespread use of volume-based metrics for team performance. How do we shift from measuring activity to measuring true impact?
Vulnerability ManagementVMware flaws exploited in the wild; Broadcom releases patchesVMware ESX, VMware vSphere, VMware Cloud Foundation, or VMware Telco Cloud Platform are affected.
Network SecurityOpenSSF sets baseline security standards for Linux-based softwareNew standards seen as a good move, but some worry it may breed complacency in security.
Cloud SecurityHow to plan your cloud migration with security in mindTo protect your cloud-based assets, your organization must consider security and compliance when planning your cloud migration journey.
Network SecurityAttackers achieving network intrusions in just under 4.5 hoursWhile attackers are moving faster across networks, they still rely on old methods such as phishing.
Network SecuritySonicWall, Palo Alto Networks flaws under attack, added to CISA listThe critical SonicOS SSLVPN flaw and high-severity PAN-OS flaw both risk authentication bypass.
Cloud SecurityUnpack the stack: Understanding modern AI security challenges during cloud migrationHere are key security elements to prioritize when migrating your AI stack to the cloud.
Vulnerability ManagementOpenSSH flaws could enable man-in-the-middle attacks, denial of serviceIf the VerifyHostKeyDNS option is activated, an attacker could impersonate a server to hijack SSH sessions.
Build a vulnerability management program with internet exposure in mindAaron Unterberger February 5, 2025