cybersecurity-news

Conducting Modern Insider Risk Investigations

Insider Risk Management requires a different approach than to those from external threats. IRM is unique from other domains of security in that the da...

Follina Exploited by State-Sponsored Hackers

A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets. Researchers have added state-sponsore...

LockBit overtakes Conti as most active ransomware group so far in 2022

The LockBit ransomware group is the most active so far in 2022. (Image provided by Recorded Future) KELA on Monday released threat intelligence data ...

Apple unveils passkeys for passwordless authentication to apps and websites

At WWDC 2022, Apple has announced and previewed iOS 16 and iPad OS 16, macOS 13 (aka macOS Ventura), watchOS 9, their new M2 chips, new MacBook Air an...

Attackers Use Public Exploits to Throttle Atlassian Confluence Flaw

The vulnerability remains unpatched on many versions of the collaboration tool and has potential to create a SolarWinds-type scenario. Threat actors ...

Google Patches Critical Android Vulnerabilities With June 2022 Updates

Google this week announced that the latest Android patches resolve a total of 40 vulnerabilities, including several rated “critical.” The most se...

AccessQuint Access360