Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs

There are approximately 163 devices worldwide that are still exposed to attack via the CVE-2024-39717 vulnerability. Continue reading Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs

Apple Operating Systems are Being Targeted by Threat Actors, Plus 4 More Vulnerability Trends

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%. Three of the other vulnerability trends in this report relate to Microsoft. Continue reading Apple Operating Systems are Being Targeted by Threat Actors, Plus 4 More Vulnerability Trends

The 3 key stages of ransomware attacks and useful indicators of compromise

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we will dive into those key stages… Continue reading The 3 key stages of ransomware attacks and useful indicators of compromise

Misconfiguration leaves thousands of servers vulnerable to attack, researchers find

Simple mistakes and configuration errors is still a major cybersecurity issue, according to security firm Censys.

The post Misconfiguration leaves thousands of servers vulnerable to attack, researchers find appeared first on CyberScoop.

Continue reading Misconfiguration leaves thousands of servers vulnerable to attack, researchers find

Why ServerCat is the server monitoring and access tool you’ve been looking for

If you’re looking for a single tool to help monitor and access your servers and containers, ServerCat might be just the ticket.
The post Why ServerCat is the server monitoring and access tool you’ve been looking for appeared first on TechRepublic.
Continue reading Why ServerCat is the server monitoring and access tool you’ve been looking for

Cybercriminals on Discord: Discovering developing threats

In this video for Help Net Security, Tal Samra, Cyber Threat Analyst at Cyberint, talks about Discord, a platform often used for cybercrime activities, and the possible threats users might come across. The application offers its users privacy and encry… Continue reading Cybercriminals on Discord: Discovering developing threats

Storage systems vulnerabilities: Act now to avoid disasters

Continuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage systems have a significantly weaker security posture than the other two layers… Continue reading Storage systems vulnerabilities: Act now to avoid disasters