The vulnerability gives hackers a means to access sensitive data, move laterally in a network, or execute a ransomware attack.
Stories by Lucian Constantin
A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software.
The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organisations.
The exploit requires the attacker to have valid credentials, but experts advise patching regardless.
Researchers discover a new TrickBot module that allows malware to persist even after reformatting or replacing a hard drive.
New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images.
Attackers could use the vulnerability to access encryption keys from the Linux kernel's memory or Intel SGX enclaves.
This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.
FIN11, believed to be Russian-based, follows a trend of cyber criminal groups expanding their operations beyond financial crime.
New study shows that even security vendors can use outdated and vulnerable virtual appliances. Top advice: Make sure your vulnerability management processes include virtual appliances.
The Bahamut group targets high-value victims and takes meticulous care with its own operational security.
Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.
Attackers have learned how to exploit the Zerologon vulnerability in Windows Server, potentially gaining domain admin control.
Evilnum, a group known for targeting financial technology companies, has added new malware and infection tricks to its arsenal, researchers warn.
APT-for-hire services will broaden the scope of who is vulnerable to that type of attack. SMBs in particular need to rethink threat models.