Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated persistence techniques to maintain long-term access within targeted environments. These advanced persistent threats (APTs) are often orchestrated by government-backed groups with significant resources, making them…
Tag: Cyber Security News
How To Prioritize Threat Intelligence Alerts In A High-Volume SOC
In today’s rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge: efficiently managing and prioritizing the overwhelming volume of security alerts they receive daily. SOC analysts often can’t read and respond to a significant portion of…
How to Implementing SOAR To Reduce Incident Response Time Effectively
In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security alerts, sophisticated cyber threats, and the ongoing shortage of skilled cybersecurity professionals. Security Orchestration, Automation, and Response (SOAR) platforms have emerged as a transformative solution…
Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN
A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal of exploitation tools specifically designed to target Fortinet firewall and VPN appliances. The infrastructure, which security researchers have attributed to the RedGolf threat group (overlapping…
Securing the Digital Transformation Journey – What CISOs Must Consider
Digital transformation is no longer a buzzword it is a strategic imperative for organizations seeking to stay competitive in an ever-evolving landscape. As businesses embrace cloud computing, artificial intelligence, IoT, and remote work, the attack surface expands exponentially. This evolution…
How Generative AI is Changing Red Team Tactics
The rapid evolution of generative AI has fundamentally transformed the landscape of cybersecurity, especially in the context of red teaming. Traditionally, red teams have focused on simulating adversarial attacks to uncover vulnerabilities in networks, software, and infrastructure. However, the unpredictable…
Fortinet Ends SSL-VPN Support From 7.6.3 Onwards!
Fortinet has announced the complete removal of SSL VPN tunnel mode functionality in the upcoming FortiOS 7.6.3 release. This change, affecting all FortiGate models regardless of size, marks the culmination of Fortinet’s gradual phase-out of SSL VPN that began with…
How to Build a Security Champions Program Within Your Organization
In today’s hyper-connected world, cybersecurity is no longer the sole responsibility of a dedicated security team. As organizations scale and technology becomes increasingly integrated into every aspect of business, the risks and attack surfaces multiply. Yet, security teams are often…
How to Use Passive DNS To Trace Hackers Command And Control Infrastructure
Passive DNS has emerged as a critical tool for cybersecurity professionals seeking to identify and track malicious command and control (C2) infrastructure. By creating a historical record of DNS activities, security teams can follow the digital breadcrumbs left by threat…
6,000,000+ Installed Chrome Extensions Can Execute Remote Commands on User’s Browser
A major security incident has come to light involving more than six million installations of Chrome browser extensions that secretly execute remote commands, track user activity, and potentially expose sensitive information. John Tuckner of secure Annex have identified at least…