We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
AvosLocker made a name for itself by targeting critical infrastructure in different sectors of the US, Canada, UK and Spain in 2021. Their clever use of conventional tactics makes it a ransomware variant still worth monitoring today. Read on to find out more about the group.
Indian government sites contain massive amounts of sensitive data, and since they are frequently targeted by malicious hackers and hacktivists, Securin investigated their cyber hygiene by running a scan on their public-facing assets and found many potential gaps in their security.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending and new vulnerabilities that hackers are exploiting.
Securin experts mapped ransomware vulnerabilities to the MITRE Att&ck framework and identified 57 vulnerabilities that can be exploited from initial access to exfiltration.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
Read Securin experts' insights when they revisited HIVE and their attack tactics and techniques, and what organizations can do to remain safe from future attacks.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
Securin’s VRS measures the risk posed by a vulnerability, considering factors such CVSS vector, threat associations, exploitation trends, and our AI- and ML-based predictions.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
Securin experts list and analysis the top vulnerabilities that trended on the surface web and were sought out by attackers.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
Companies that have experienced a breach underperform the market by more than 15% three years later. That raises the question - “Is your data safe?”
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
Vice Society has been observed employing ransomware variants, similar to the Russian Sandworm Team and TA505 threat actors.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | November 7, 2022 - November 11, 2022
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | October 31, 2022 - November 4, 2022
This blog brings you all the DHS CISA KEVs that need to be prioritized for patching from October 24, 2022 to October 28, 2022
This blog brings you all the DHS CISA KEVs that need to be prioritized for patching from Oct 17, 2022 to Oct 21, 2022
Securin experts have discovered a Zero Day vulnerability with medium severity in Tenable’s Nessus Professional scanner.
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | October 10, 2022 - October 14, 2022
This blog brings you all the DHS CISA KEVs that need to be prioritized for patching from Oct 3, 2022 to Oct 7, 2022
We bring you threats that are currently trending as well as new vulnerabilities that hackers are exploiting. | September 26, 2022 - September 30, 2022
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
As the world still reels under the impact of the Ukraine-Russia cyberwar, yet another Cyberwar has started between Iran and Albania. Securin's experts provide insights into Iranian threats that organizations need to watch out for.
The DHS Cybersecurity and Infrastructure Security Agency (CISA) released a directive with a list of 905 known and exploited vulnerabilities that public sector entities and organizations need to patch immediately!
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
Does your organization use Network Attached Storage (NAS) devices? You should revisit your security strategy.
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
Read about Securin's research into the ransomware group, the vulnerabilities they use, their attack techniques and tactics.
Despite being patched four years ago, the self-propagating malware, Indexsinas SMB worm, exposes that Windows servers are still vulnerable to the infamous NSA EternalBlue exploits and can be used for crypto-mining. Here is our analysis of these vulnerabilities and their present exposure.
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
Apache Log4j vulnerability is a critical zero-day code execution vulnerability. On December 9, 2021, the Internet was set on fire when an exploit was posted publicly for Apache Log4J - a well-known logging utility in the Java programming language.
We looked into the DHS CISA KEV catalog one step further and found that 58 actively known exploited CVEs were missed by top scanners such as Nessus, Nexpose, and Qualys. Click here to know more!
The video surveillance giant Hikvision disclosed a zero-click vulnerability in Hikvision camera models that is highly susceptible to remote hijacking without requiring a username or password.
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
Did you know hackers can exploit 125 weaponized vulnerabilities in VPN products to attack their targets? Securin analysts deep dive into exposures in VPNs that could compromise organizational networks.
Described as a "cybersecurity Hiroshima" or a "Fukushima moment," the impact of the Log4j vulnerability continues to be felt by thousands of companies exploited or attacked by hackers and ransomware. Yet, rapid and proactive action from Securin’s Incident Response Team has helped protect all its clients.
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
Securin's analysis of the vulnerabilities and attack tactics used by APT29 in recent campaigns
This edition brings you early warnings, trending news about cyber threats, and the accurate threat context. Check out which threat group is on the rampage, what vulnerability it could soon weaponize, and more.
An unpatched vulnerability tracked as CVE-2022-30190 (aka Follina) in the remote Word template feature enables adversaries to execute malicious code on targeted systems of Microsoft Office.