Kaseya gets the Decryptor

Kaseya gets the Decryptor

Kaseya at the center of a huge ransomware attack this month has obtained a universal key to unlock files of the hundreds of businesses and public organizations crippled by the…

MITRE ATT&CK Top Most Software Bugs

Software weaknesses are flaws, bugs, vulnerabilities, and various other types of errors impacting a software solution's code, architecture, implementation, or design, potentially exposing systems it's running on to attacks. MITRE…
Hive Nightmare Workaround

Hive Nightmare Workaround

After setting the "days since a security cock-up" counter back to zero, Microsoft has published an official workaround for its Access Control Lists (ACLs) vulnerability (CVE-2021-36934). Use the icacls command…
Google Autonomic Sec Ops

Google Autonomic Sec Ops

Autonomic Security Operations, represents a “stack of products, integrations, blueprints, technical content, and an accelerator program” help customers leverage Chronicle and Google technology and expertise to advance their SOC and…
NIST Software Security Guidance

NIST Software Security Guidance

NIST spells out security measures for "critical software" used by federal agencies and minimum standards for testing its source code. The best practices could be a model for the private sector…
Hello Kitty Targets VMware ESXi

Hello Kitty Targets VMware ESXi

VMware ESXi is apparently gaining popularity among cyber attackers. Several prominent malware operators, mostly ransomware gangs, have started targeting VMware’s hypervisor solution used by a large number of enterprises. The…