Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack? Posted on September 13, 2023 The campaign started with a trojanized version of unsupported financial software
Cybersecurity Scenario and Strategy Planning Security Cybersecurity Scenario and Strategy Planning is a good way for… rooter March 9, 2023 1 min read 0
Magnet Goblin group used a new Linux variant of NerbianRAT malware Security The financially motivated hacking group Magnet Goblin uses various 1-day… rooter March 11, 2024 4 min read 0
A Step-by-Step Guide to Build a Strategic Vulnerability Management Policy Security A vulnerability management policy is a set of guidelines and… rooter March 31, 2023 1 min read 0
Operation Endgame Security Presently sponsored by: Report URI: Guarding you from rogue JavaScript!… rooter May 30, 2024 5 min read 0