Latest Posts › Cyber Threats

Share:

Adversary-in-the-Middle attacks can subvert passkey protections

Backup authentication methods create a vulnerability in passkey protection to adversary-in-the-middle attacks. Security protections from passkey authentication can still potentially be subverted by attackers....more

CL0P ransomware gang is on the rise

CL0P is adopting “quadruple extortion” tactics. If your organization has received a ransomware demand, CL0P may be a familiar name. In 2023, CL0P was the third most prolific ransomware gang, after Lockbit and ALPHV....more

Security Snippets: Linux systems exposed to boot loader attack

New vulnerability found in the boot process for Linux systems configured to boot over the network. A high severity vulnerability could allow attackers to take over a Linux system. The vulnerability is in the shim software...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide