Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.
Stories by Lucian Constantin
Three weeks after releasing patches for a critical vulnerability in VMware vCenter, thousands of servers remain vulnerable to attacks.
This newly discovered malware is the first to take advantage of an obscure Windows container escape technique to seek out and infect Kubernetes clusters.
Known and unknown groups are using VPN vulnerabilities to circumvent authentication and establish backdoors.
The FBI has been deleting backdoors placed by cyber espionage group Hafnium on Microsoft Exchange servers, signalling a more active defence approach.
The Golden Chickens cyber criminal gang is believed to sell its more_eggs backdoor for campaigns executed using information from LinkedIn profiles.
Attackers were able to place malicious code in the PHP central code repository, forcing changes to the PHP Group's infrastructure.
Magic WAN and Magic Firewall aim to simplify linking sites and data centres while allowing organisations to better enforce security policies.
The Linux Foundation's sigstore code-signing software, developed with IBM and Red Hat, will help prevent attacks on the software supply chain
Ryuk attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
Aims to improve performance of FHE to make it practical for business and government to better protect confidential data in the cloud.
Gootloader component infects computers by hijacking Google search results to send victims to legitimate but compromised websites.
Microsoft believes Chinese APT group Hafnium is using a set of previously unknown Exchange Server vulnerabilities to access mailbox contents and perform remote code execution.
A cyber criminal group associated with the Egregor ransomware was dismantled in Ukraine following a joint action by US, French and Ukrainian authorities.
New iteration of TrickBot botnet, which had enabled Ryuk and other attacks, uses malicious links in emails rather than rogue email attachments.
Nominations now closed