Category: EN

Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours

Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomware. On … Read More The post Buzzing on Christmas Eve: Trigona…

Failing Upwards (or not) (Pt1)

If you find yourself on the path of leading a team, make sure you set critical baselines with your team. Always do what is best for your team and set them up for success. This article has been indexed from…

Business Cybersecurity Culture: Building a Secure Workforce

Today, businesses face an ongoing threat of cyberattacks in our constantly evolving digital landscape. These risks range from sophisticated phishing scams to targeted malware. To… The post Business Cybersecurity Culture: Building a Secure Workforce appeared first on Security Zap. This…

Cyber Insurance for Businesses: Navigating Coverage

Businesses today face an increasing risk of cyberattacks in our interconnected world. These attacks can result in significant financial losses and damage to a company’s… The post Cyber Insurance for Businesses: Navigating Coverage appeared first on Security Zap. This article…

Third-Party Security Assessments: Vendor Risk Management

In today’s interconnected business landscape, organizations face increasing challenges in managing the risks associated with third-party vendors. As businesses rely more heavily on external vendors… The post Third-Party Security Assessments: Vendor Risk Management appeared first on Security Zap. This article…

Multiple PoC exploits released for Jenkins flaw CVE-2024-23897

Multiple proof-of-concept (PoC) exploits for recently disclosed critical Jenkins vulnerability CVE-2024-23897 have been released. Researchers warn that several proof-of-concept (PoC) exploits targeting the recently disclosed critical Jenkins vulnerability, CVE-2024-23897, have been made public. Jenkins is the most popular open source automation…