3 February 2023Ravie LakshmananVulnerability management On February 2, the US Cybersecurity and Infrastructure Security Agency (CISA) added two security flaws to its KEV (Known Exploited Vulnerabilities) catalog, citing evidence of…
Question: How does a threat actor use DNS communication in malware attacks? Dave Mitchell, CTO, Hyas: The idea that you can protect yourself against all malware is unrealistic, especially given…
Wednesday’s attack left both victims with serious injuries to their heads, hands and feet. Four locals were attacked in the same reserve on Saturday, leaving one in a critical condition.
The attacks on Kherson also wounded at least nine people and damaged a hospital, a school and other buildings. Kyiv’s forces say they repelled attacks in Blahodatne and other settlements…
Just a few days before Christmas I got some news The Guardian the paper had suffered what turned out to be a ransomware attack that forced staff to work from…
28 January 2023Ravie LakshmananCyber threat / Cyber war Ukraine has come under fire from a new cyber attack by Russia that involved the deployment of a previously undocumented Golang-based data…
With the threat of climate change to Virginia’s coastal and inland communities, it is fitting that the Commonwealth is the leading Southern state in cutting its carbon emissions. In addition…
26 January 2023Ravie LakshmananCyber threat/phishing At least two federal agencies in the United States fell victim to a “widespread cyber campaign” that involved the use of legitimate remote monitoring and…
About 10,000 villagers in two townships have fled their homes as junta troops continued operations in the scorched earth in Myanmar’s northern Sagaing region, locals told RFA. A column of…
Attackers from the al-Shabab Islamist group set off a bomb and then stormed the government building in Somalia’s capital and were caught in a firefight with security forces, the ministry…