March 11th, 2024 | 🕒
TTS Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed exploiting security flaws in
January 12th, 2024 | 🕒
iSpeech.org Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by suspected nation-state actors
January 11th, 2024 | 🕒
https://www.ispeech.org Jan 11, 2024NewsroomCybersecurity / Software Security The ubiquity of GitHub in information technology (IT) environments has made it a
December 6th, 2023 | 🕒
https://www.ispeech.org Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service
November 3rd, 2023 | 🕒
TTS Nov 03, 2023NewsroomCloud Security / Linux The threat actors linked to Kinsing have been observed attempting to exploit the
October 21st, 2023 | 🕒
TTS Oct 21, 2023NewsroomData Breach / Cyber Attack Identity services provider Okta on Friday disclosed a new security incident that
October 19th, 2023 | 🕒
https://www.ispeech.org Oct 19, 2023NewsroomCyber Threat / Vulnerability A number of state-back threat actors from Russia and China have been observed
October 5th, 2023 | 🕒
https://www.ispeech.org Oct 05, 2023NewsroomRansomware / Malware Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have
September 15th, 2023 | 🕒
TTS Demo Sep 15, 2023THNCyber Attack / Password Security Iranian nation-state actors have been conducting password spray attacks against thousands
September 15th, 2023 | 🕒
iSpeech.org Sep 15, 2023THNCyber Attack / Password Security Iranian nation-state actors have been conducting password spray attacks against thousands of
September 1st, 2023 | 🕒
iSpeech.org Sep 01, 2023THNDatabase Security / Ransomware Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver
July 25th, 2023 | 🕒
iSpeech.org North Korean nation-state actors affiliated with the Reconnaissance General Bureau (RGB) have been attributed to the JumpCloud hack following
February 19th, 2023 | 🕒
iSpeech.org While many advanced persistent threat (APT) groups have increasingly embraced strategic Web compromise as a malware delivery vector, groups
February 14th, 2023 | 🕒
iSpeech February 1, 2023 See how Research Team Lead Carlos Perez dissects a sample of a OneNote document that was
Gloss