
Resources

Linux Exploit SLUBStick Grants Full Memory Access
August 06, 2024 | Researchers have unveiled a new Linux kernel exploit technique called SLUBStick.

Five Ways to Defend Against VMware ESXi Server Attacks
August 7, 2024 | A recent surge in attacks targeting VMware ESXi servers, exploiting the critical CVE-2024-37

SEC Takes No Action on Progress Software for MOVEit Transfer Case
August 9, 2024 | The SEC has decided not to recommend enforcement action against Progress Software for the MOVEit Transfer vul
Hackers Leak Internal Documents Stolen from Leidos Holdings
July 23, 2024 | Hackers have leaked internal documents from Leidos Holdings Inc., an IT services provider to
Cybersecurity Skills and Breaches: What Tech Pros Need to Know
29 July 2024 | A new Fortinet report reveals that 90% of organizations experienced breaches due to a lack of cybersecurity sk
The Gately Report: Zimperium Partners Get Formal Channel Program
Plus, cybercriminals
1 Million HotJar Users Vulnerable to XSS Attacks
July 29, 2024 | Salt Labs discovered a critical XSS vulnerability in HotJar, impacting over 1 million websites.
Women in IT Security Lack Opportunities, Not Talent
July 23, 2024 | Women in IT security are as skilled as men but face significant career barriers, according to a study by WiCy
Cybersecurity Firm KnowBe4 Tricked into Hiring North Korean Hacker as IT Pro
July 24, 2024 | KnowBe4, a cybersecurity firm, was deceived by a North Korean hacker posing as an IT worker.
CISOs Reveal Firms Prioritize Savings Over Long-Term Security
June 27, 2024 | Bugcrowd’s 2024 Inside the Mind of a CISO report highlights that 33% of security leaders believe companies sac
Eldorado Ransomware Targets VMware ESXi
July 9, 2024 | A new ransomware-as-a-service platform, Eldorado, targets Windows and VMware ESXi environments.