Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat…
Browsing: Cybersecurity
The European Commission’s mobile device management platform was hacked but the incident was swiftly contained and no compromise of mobile…
Hackers are exploiting SolarWinds Web Help Desk (WHD) vulnerabilities to deploy legitimate tools for malicious purposes, such as the Zoho…
Ravie LakshmananFeb 09, 2026Cyber Espionage / Virtualization The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus…
SmarterTools, the company behind the popular Microsoft Exchange alternative SmarterMail, has been breached by a ransomware-wielding group that leveraged a…
Passwords remain a persistent point of tension between usability and security. Controls designed to strengthen authentication often introduce complexity, which…
Mere data exfiltration is no longer a lucrative approach for ransomware groups, and threat actors may increasingly rely on encryption…
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles…
BeyondTrust fixed a critical remote code execution vulnerability (CVE-2026-1731) in its Remote Support (RS) and Privileged Remote Access (PRA) solutions…
Microsoft is investigating an ongoing Exchange Online issue that mistakenly flags legitimate emails as phishing and quarantines them. The incident…
