Your attack surface no longer lives on one operating system, and neither do the campaigns targeting it. In enterprise environments,...
The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials...
Hackers published 36 NPM packages posing as Strapi plugins to execute shells, escape containers, and harvest credentials.
The...
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to...
The improper access control bug in FortiClient EMS allows unauthenticated attackers to execute arbitrary code remotely.
The post...
