SIEM as a Service
Home Search

Weekly Round-Up - search results

If you're not happy with the results, please do another search
Researchers Unpacked ViperSoftX Malware’s Evasion Tactics And Techniques

Researchers Unpacked ViperSoftX Malware’s Evasion Tactics And Techniques

Sophisticated threat actors, like those behind the ViperSoftX malware from 2020, often make use of existing tools to save time and resources.  ViperSoftX uses AutoIt,...
Chrome Zero-Day Vulnerability (CVE-2024-7965) Actively Exploited in the Wild

Chrome Zero-Day Vulnerability (CVE-2024-7965) Actively Exploited in the Wild

Google has addressed a critical zero-day vulnerability in its Chrome browser, identified as CVE-2024-7965. This high-severity flaw, which affects versions of Chrome prior to...
Patch Management Tools

15 Best Patch Management Tools In 2024

Patch management tools or software are essential for maintaining software systems' security and functionality. They automate identifying, acquiring, testing, and deploying patches to ensure...
Chrome Zero-day Vulnerability (CVE-2024-7971)

Chrome Zero-day Vulnerability (CVE-2024-7971) Actively Exploited in The Wild

Google has recently addressed a high-severity zero-day vulnerability in its Chrome browser, identified as CVE-2024-7971. This vulnerability involves a type of confusion issue within...
Best Automated Penetration Testing Tools

10 Best Automated Penetration Testing Tools In 2024

Automated penetration testing, known as vulnerability scanning, uses software to detect security flaws in networks, websites, applications, and cloud infrastructure. The process of assessing security...
Indian Crypto Platform Wazirx Hacked: $230 Million Funds Stolen

Indian Crypto Platform Wazirx Hacked: $230 Million Funds Stolen

 Indian cryptocurrency exchange WazirX announced that it has fallen victim to a sophisticated cyber attack, resulting in the theft of over $230 million from...
Cyber Security Search Engines

30 Best Cyber Security Search Engines In 2024

In the 21st century, it has become crucial for every user, including IT security professionals, to access search engines, as they have become essential...
Hackers Weaponizing Microsoft Office Documents to Deploy Malware in Business Environments

Hackers Weaponizing Microsoft Office Documents to Deploy Malware in Business Environments

Microsoft Office allows one to generate a professional business report on office365 or write college essays, prepare CVs, take notes, and perform analysis.  These offer...
Best Practices for Deploying and Managing Endpoint Management Software

Best Practices for Deploying and Managing Endpoint Management Software

Endpoint management software plays a crucial role in ensuring the security and efficiency of an organization's network. As technology advances and threats become more...
SandStorm Hackers Added New Kapeka Tool to it’s Arsenal

SandStorm Hackers Added New Kapeka Tool to it’s Arsenal

Kapeka, also known as KnuckleTouch, is a sophisticated backdoor malware that has been making waves in the cybersecurity world.  Initially appearing in mid-2022, it wasn’t...
SIEM as a Service

Recent Posts