China-linked APT Volt Typhoon exploited a zero-day in Versa Director

China-linked APT group Volt Typhoon exploited a zero-day flaw in Versa Director to upload a custom webshell in target networks. China-linked APT Volt Typhoon exploited a zero-day vulnerability, tracked... Read more »

Versa Director zero-day exploited to compromise ISPs, MSPs (CVE-2024-39717)

Advanced, persistent attackers have exploited a zero-day vulnerability (CVE-2024-39717) in Versa Director to compromise US-based managed service providers with a custom-made web shell dubbed VersaMem by the researchers. The... Read more »

DigitalOcean unveils enhanced role-based access control

DigitalOcean announced updates to its role-based access control (RBAC), a method for managing user access to systems and resources within an organization by assigning permissions to roles rather than... Read more »

1/3 of Companies Suffered a SaaS Data Breach in Last Year, 5% Increase

The finding is linked to a lack of visibility of the business’s app estate and decentralised security governance. Read more »

Hillstone Networks unveils StoneOS 5.5R11 to enhance threat protection

Hillstone Networks has launched the latest version of its operating system, StoneOS 5.5R11. This update includes over 200 new functionalities and improvements designed to enhance threat protection and facilitate... Read more »

RSA Authenticator App improves cybersecurity for federal agencies

RSA announced new passwordless, phishing-resistant capabilities that meet stringent technical standards and can help public sector agencies, contractors, and systems integrators fulfill Executive Order 14028 and National Security Memo... Read more »

Researchers unmasked the notorious threat actor USDoD

CrowdStrike researchers have identified the notorious hacker USDoD who is behind several high-profile data leaks. The notorious hacker USDoD (aka EquationCorp), who is known for high-profile data leaks, is... Read more »

The 5 Best Free Endpoint Protection Platforms for 2024

Discover our top picks for reputable free endpoint protection platforms and compare their features, pros and cons in this in-depth guide. Read more »

Extending zero-trust principles to endpoints

Read more »

The US courts may have thrown a wrench into cyber regulation

Read more »
Subscribe to our Newsletter