Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.
Stories by Lucian Constantin
Three weeks after releasing patches for a critical vulnerability in VMware vCenter, thousands of servers remain vulnerable to attacks.
This newly discovered malware is the first to take advantage of an obscure Windows container escape technique to seek out and infect Kubernetes clusters.
Known and unknown groups are using VPN vulnerabilities to circumvent authentication and establish backdoors.
The FBI has been deleting backdoors placed by cyber espionage group Hafnium on Microsoft Exchange servers, signalling a more active defence approach.
Data poisoning involves tampering with and polluting a machine learning model's training data, impacting the ability to produce accurate predictions.
The Golden Chickens cyber criminal gang is believed to sell its more_eggs backdoor for campaigns executed using information from LinkedIn profiles.
Attackers were able to place malicious code in the PHP central code repository, forcing changes to the PHP Group's infrastructure.
Magic WAN and Magic Firewall aim to simplify linking sites and data centres while allowing organisations to better enforce security policies.
Ryuk attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
Aims to improve performance of FHE to make it practical for business and government to better protect confidential data in the cloud.
The Linux Foundation's sigstore code-signing software, developed with IBM and Red Hat, will help prevent attacks on the software supply chain
Gootloader component infects computers by hijacking Google search results to send victims to legitimate but compromised websites.
A cyber criminal group associated with the Egregor ransomware was dismantled in Ukraine following a joint action by US, French and Ukrainian authorities.
Much like customers, partners also require guidance on the key technologies and markets to pursue. Read the Channel Roadmap to build a blueprint for future success.