Monitoring Changes in KEV List Can Guide Security Teams Posted on August 7, 2024 The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Google Patches New Android Kernel Vulnerability Exploited in the Wild News Google has addressed a high-severity security flaw impacting the Android… rooter August 6, 2024 1 min read 0
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes News Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts… rooter August 9, 2023 1 min read 0
Smishing Triad Is Targeting India To Steal Personal and Payment Data at Scale News Resecurity has identified a new campaign by the Smishing Triad… rooter July 12, 2024 3 min read 0
Kenya Issues New Guidance for Protecting Personal Data News Kenya has a data privacy law. Now it's up to… rooter January 16, 2024 1 min read 0