Recognition Badges for Threat Bounty Members
As it was announced earlier, SOC Prime introduced digital badge recognition for Threat Bounty members. As the first stage of…
As it was announced earlier, SOC Prime introduced digital badge recognition for Threat Bounty members. As the first stage of…
Cybersecurity experts remain vigilant amidst an ongoing supply chain attack that has cast a shadow over the most widely-used Linux…
Security researchers warn of a critical privilege escalation vulnerability in multiple macOS versions that enables unauthorized users, including those with…
Hackers employ diverse TTPs in a multi-stage software supply-chain campaign going after GitHub users, including members of the widely recognized…
Hard on the heels of the DEEP#GOSU offensive campaign associated with the North Korean hacking collective Kimsuky APT, the group…
The nefarious cyber-espionage North Korean Kimsuky APT group has been in the limelight in the cyber threatscape since at least…
Ransomware remains a top threat to organizations globally, with a constant surge in the volume and sophistication of attacks. Among…
Hot on the heels of nasty JetBrains TeamCity vulnerabilities (CVE-2024-27198, CVE-2024-2719), security experts reveal a new RCE affecting Microsoft Outlook.…
Threat Bounty Publications In February, the members of the Threat Bounty program submitted more than 350 detections for review by…
A new malware iteration dubbed TODDLERSHARK comes into the spotlight in the cyber threat arena, which bears a striking similarity…