CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw…
Multiple Vulnerabilities in Sophos Firewall Could Allow for Remote Code Execution
Multiple Vulnerabilities have been discovered in Sophos Firewall, the most severe of which could allow…
‘Fix It’ social-engineering scheme impersonates several brands
More and more, threat actors are leveraging the browser to deliver malware in ways that…
Welcome to the party, pal!
Welcome to the final Threat Source newsletter of 2024. Watching "Die Hard" during the Christmas season…
Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found
Cisco Talos’ Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader,…
Securing Cloud Environments Against Potential Extortion Threats
Introduction With the growing reliance on cloud infrastructure, organizations must be vigilant against potential extortion…
TP-Link faces US national security probe, potential ban on devices
The US government launched a national security investigation into the popular, Chinese-owned router maker TP-Link,…
New Microsoft guidance for the CISA Zero Trust Maturity Model
The Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model (ZTMM) assists agencies in development…
Enhancing Events with Geolocation Data in Logstash
If you are using Logstash and need to enrich event data with geolocation information based…
Sonic and Injective Team Up to Build Industry’s First Cross-Chain Smart Agent Hub with Solana
Sonic, the leading gaming SVM on Solana, and Injective, a WASM-based L1 network, today announced…