Category: EN

What best practices ensure long-term compliance for NHIs?

What Are the Essential Considerations for Long-Term Compliance of Non-Human Identities? The importance of Non-Human Identities (NHIs) in cybersecurity cannot be overstated. But how do organizations ensure the long-term compliance of these NHIs? In a nutshell, it requires a conscientious…

How can technology simplify the process of NHI compliance?

How is Technology Revolutionizing Non-Human Identities (NHI) Compliance? How can the integration of advanced technology streamline the process of NHI compliance? A robust cybersecurity strategy is indispensable, especially regarding the management of non-human identities (NHIs) and secrets for comprehensive cloud…

CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Malware Analysis Report (MAR-25993211-r1.v1) detailing the exploitation of a critical vulnerability in Ivanti Connect Secure devices (CVE-2025-0282). This vulnerability allows attackers to gain unauthorized access and deploy sophisticated malware variants,…

Lotus Blossom APT Exploits WMI for Post-Exploitation Activities

The Lotus Blossom Advanced Persistent Threat (APT) group, also known as Lotus Panda, Billbug, and Spring Dragon, has intensified its cyberespionage efforts with new variants of the Sagerunex backdoor. These developments highlight the group’s evolving tactics, including leveraging Windows Management…

Experts warn of the new sophisticate Crocodilus mobile banking Trojan

The new Android trojan Crocodilus exploits accessibility features to steal banking and crypto credentials, mainly targeting users in Spain and Turkey. ThreatFabric researchers discovered a new Android trojan called Crocodilus, which exploits accessibility features to steal banking and crypto credentials.…