Tag: EN

Identity: the new security perimeter

What to do when your MFA is mercilessly attacked by hackers Webinar  Threat actors are always looking for that easy way in by testing weak spots, and user identities are one of their favourite targets.… This article has been indexed…

Red Hat VEX files for CVEs are now generally available

In October 2023, Red Hat Product Security announced the publishing of Vulnerability Exploitability eXchange (VEX) files, in beta form, for every single CVE ID that is recorded in the Red Hat CVE Database. Since then, we have actively collected feedback…

P2PInfect Botnet Using Miner And Ransomware Payload

Recent media reports have brought to light the P2PInfect malware. The peer-to-peer botnet has been found targeting and exploiting the Redis server’s vulnerability with ransomware and crypto miners. The malware that was once deemed to be dormant and without motive…

Indiana County Files Disaster Declaration Following Ransomware Attack

Clay County, Indiana, said a ransomware attack has prevented the administration of critical services, leading to a disaster declaration being filed This article has been indexed from www.infosecurity-magazine.com Read the original article: Indiana County Files Disaster Declaration Following Ransomware Attack