CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw…

Multiple Vulnerabilities in Sophos Firewall Could Allow for Remote Code Execution

Multiple Vulnerabilities have been discovered in Sophos Firewall, the most severe of which could allow…

‘Fix It’ social-engineering scheme impersonates several brands

More and more, threat actors are leveraging the browser to deliver malware in ways that…

Welcome to the party, pal!

Welcome to the final Threat Source newsletter of 2024. Watching "Die Hard" during the Christmas season…

Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found

Cisco Talos’ Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader,…

Securing Cloud Environments Against Potential Extortion Threats

Introduction With the growing reliance on cloud infrastructure, organizations must be vigilant against potential extortion…

TP-Link faces US national security probe, potential ban on devices

The US government launched a national security investigation into the popular, Chinese-owned router maker TP-Link,…

New Microsoft guidance for the CISA Zero Trust Maturity Model

The Cybersecurity Infrastructure Security Agency (CISA) Zero Trust Maturity Model (ZTMM) assists agencies in development…

Enhancing Events with Geolocation Data in Logstash

If you are using Logstash and need to enrich event data with geolocation information based…

Sonic and Injective Team Up to Build Industry’s First Cross-Chain Smart Agent Hub with Solana

Sonic, the leading gaming SVM on Solana, and Injective, a WASM-based L1 network, today announced…