Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
[This is a Guest Diary by Joseph Gruen, an ISC intern as part of the SANS.edu BACS program]
When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the…
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
149 hacktivist attacks hit 110 organizations across 16 countries after Middle East conflict, targeting governments, infrastructure, & telecom sectors.
Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here's his story.
Google uncovered Coruna iOS exploit kit with 23 exploits across five chains targeting iPhones running iOS 13–17.2.1.
New RFP guide helps CISOs evaluate AI governance tools, focusing on interaction-level security and vendor accountability.
The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities.
And another XWorm[1] wave in the wild! This malware family is not new and heavily spread but delivery techniques always evolve and deserve to be described to show you how threat actors can be imaginative! This time, we are facing another piece of multi-technology malware.
Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via C2 server.
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.