News

Users must configure updated settings in SQLite and Infinity plugins to defend against attackers gaining admin privileges on ...
Breaches continue to happen as SOC analysts deal with too many alerts or rules of engagement that stops them from acting.
A newly identified group launched attacks against key organizations in Georgia and Moldova using a custom backdoor program that hijacks a Microsoft .NET optimization tool for persistence.