SIEM as a Service
Home Search

Weekly - search results

If you're not happy with the results, please do another search
Threat and Vulnerability October 29 to November 4

Threat and Vulnerability Roundup for the week of October 29th to November 4th

Hey there, welcome to Cyber Writes' weekly publication - the Threat and Vulnerability Roundup! Get ready to dive into the latest and greatest in...
Threat and Vulnerability Roundup for the week of August 20th to 26th

Threat and Vulnerability Roundup for the week of August 20th to 26th

Welcome to the Threat and Vulnerability Roundup, a weekly publication from Cyber Writes that provides the most recent news on cybersecurity. Use our wide...
New Chrome Feature Alerts Users About Malicious Extensions

New Chrome Feature Alerts Users About Malicious Extensions

Chrome has released an announcement about its version 117, in which a new feature has been introduced regarding removed extensions from the Chrome web...
Google Chrome Security Update – Multiple High-Severity Vulnerabilities Patched

Google Chrome Security Update – Multiple High-Severity Vulnerabilities Patched

In a security update for Chrome, Google has updated the Stable and Extended stable channels to 116.0.5845.110 for Mac and Linux and 116.0.5845.110/.111 for Windows....
Threat and Vulnerability Roundup for the week of August 13th to 19th

Threat and Vulnerability Roundup for the week of August 13th to 19th

Welcome to Cyber Writes' weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take advantage of our extensive...
Cyber Criminals Turned Mac Systems into Proxy Exit Nodes

Cyber Criminals Turned Mac Systems into Proxy Exit Nodes

Besides Windows OS, now threat actors are also actively targeting Mac systems to accomplish their illicit goals. Cybersecurity analysts at AT&T Alien Labs recently...
Threat and Vulnerability Roundup for the week of August 6th to 12th

Threat and Vulnerability Roundup for the week of August 6th to 12th

Join us at Cyber Writes for our weekly Threat and Vulnerability Roundup, where we provide the latest updates on cybersecurity news. Keep yourself informed...
Threat and Vulnerability Roundup for the week of July 30th to August 5th

Threat and Vulnerability Roundup for the week of July 30th to August 5th

The Threat and Vulnerability Roundup for this week is out! With great pride, Cyber Writes presents a weekly overview of the most recent cybersecurity...
Hackers Leverages Teams Chat to Steal Credentials from a Targeted Organization

Hackers Leverages Teams Chat to Steal Credentials from a Targeted Organization

Microsoft Threat intelligence identifies Midnight Blizzard (previously tracked as NOBELIUM) as a highly targeted social engineering attack. The attacker uses compromised Microsoft 365 tenants owned...
Hackers Use Google AMP Pages to Bypass Enterprise Email Security Measures

Hackers Use Google AMP Pages to Bypass Enterprise Email Security Measures

A new phishing tactic was discovered that takes advantage of Google Accelerated Mobile Pages (AMP), which is known to be successful in bypassing email...
SIEM as a Service

Recent Posts

ESET Integrates With Splunk SIEM

ESET Integrates Detection & Response Capabilities With Splunk SIEM

ESET, a global leader in cybersecurity solutions, has announced a significant enhancement to its ESET Endpoint Management Platform (ESET PROTECT), unveiling a seamless integration...