May 25, 2024 May 25, 2024Microsoft Detects Cyber-Espionage Strategies Used for Gift Card TheftProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024Threat Actors Backdoored JAVS Courtroom Recording Software in Supply Chain Attack – Active IOCsProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024VMware ESXi Vulnerabilities Increasingly Exploited by Ransomware AttacksProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024North Korean APT Kimsuky Aka Black Banshee – Active IOCsProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024Emerging Cyber Threats in the Middle East Retail SectorEmerging Cyber Threats in the Middle East Retail Sector
May 24, 2024 May 24, 2024APT32 SeaLotus aka OceanLotus Group – Active IOCsProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024CVE-2024-31340 – TP-Link Tether and TP-Link Tapo VulnerabilityProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024Massive ORB Proxy Networks Used by State Threat Actors to Evade DetectionProactive Defense: The Importance of Incident Response Planning in Cybersecurity
May 24, 2024 May 24, 2024Multiple TP-Link Omada ER605 Routers Zero-Day VulnerabilitiesProactive Defense: The Importance of Incident Response Planning in Cybersecurity