
Fog ransomware gang abuses employee monitoring tool in unusual multi-stage attack
Fog ransomware hackers, known for targeting US educational institutions, are now using legitimate employee monitoring software […]
Zero-Day Isn’t Zero Time: AI-Powered Threat Detection by CryptoBind
In the world of cybersecurity, “zero-day” used to mean panic. Today, it still does—for those unprepared. […]

Ungepatchte Lücken ermöglichen Übernahme von GitLab-Konten
Experten warnen vor einem neuen Bug in GitLab. II.studio – shutterstock.com Eine neue Sicherheitslücke in der […]

How to log and monitor PowerShell activity for suspicious scripts and commands
Consultants are often jacks of all trades, hired by multiple businesses — sometimes simultaneously — to […]

‘Dangerous’ vulnerability in GitLab Ultimate Enterprise Edition
A new vulnerability in GitLab’s Ultimate Enterprise Edition used for managing source code is “dangerous” and […]

Major infostealer network taken down in Interpol raid
Interpol, together with 26 countries and several cybersecurity companies, has carried out a major international operation […]

Detecting Ransomware on Networks at Scale Using Traffic Analysis
Ransomware attacks are still causing serious financial and reputational damage to organizations. In May 2024, they […]

CSO Awards 2025 showcase world-class security strategies
For more than a decade, the CSO Awards have recognized security projects that demonstrate outstanding thought […]

How to Create a Linux Bash Script – And What You Can Do With It
So, you’ve heard about Bash scripting and you’re curious what all the buzz is about? Whether […]

June Patch Tuesday advice for CSOs: Defense-in-depth needed to stop RCEs
This month’s Patch Tuesday fixes highlight a troubling pattern of remote code execution (RCE) holes being […]