The Ransomware Ecosystem: In Pursuit of Fame and Fortune
The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.
Impudent, peu sophistiqué et illogique : comprendre le groupe d'extorsion LAPSUS$
Après avoir attiré l'attention de tout le secteur pendant les premiers mois de 2022, le groupe de pirates informatiques LAPSUS$ fait profil bas. Que pouvons-nous apprendre de l'histoire et des tactiques de ce groupe d'extorsion ?
Securing Critical Infrastructure: What We've Learned from Recent Incidents
Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware.
Comprendre l'écosystème des ransomwares : des verrouilleurs d'écran aux entreprises criminelles multimillionnaires
Les ransomwares représentent une cyber-menace en constante évolution, et c'est par le biais de cette évolution qu'ils ont non seulement réussi à survivre, mais bien à prospérer.
Identifying XML External Entity: How Tenable.io Web Application Scanning Can Help
XML External Entity (XXE) flaws present unique mitigation challenges and remain a common attack path. Learn how XXE flaws arise, why some common attack paths are so challenging to mitigate and how Tenable.io Web Application Scanning can help.
Microsoft Azure Synapse Pwnalytics
Since March 10, Tenable Research has attempted to work with Microsoft to address two serious flaws in the underlying infrastructure of Azure Synapse Analytics.
So Many CVEs, So Little Time: Zero In and ‘Zero Click’ into the Current Vulnerability Landscape
Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter.
Twitter Crypto Scams: Bored Ape Yacht Club, Azuki and Other Projects Impersonated to Steal NFTs, Digital Currencies
Scammers are using verified and unverified accounts to impersonate notable NFT projects like Bored Ape Yacht Club and others, tagging Twitter users to drive them to phishing websites.
Behind the Scenes: How We Picked 2021’s Top Vulnerabilities – and What We Left Out
The 2021 Threat Landscape Retrospective explored the top five vulnerabilities of the year. Learn about other high-impact vulnerabilities that nearly made our list. When putting together the Threat Landscape Retrospective (TLR) for 2021, the Security Response Team had a particularly difficult…
La rétrospective du paysage des menaces pour l'année 2021 : cibler les vulnérabilités les plus dommageables
A review of the year in vulnerabilities and breaches, with insights to help guide cybersecurity strategy in 2022 and beyond.
YouTube Shorts: Stolen TikTok Videos Manipulated in Adult Dating, Dubious Products Scams for Views and Subscribers
As Google's TikTok competitor YouTube Shorts gains viewers, hordes of scammers are quick to follow.
Fake Bitcoin, Ethereum, Dogecoin, Cardano, Ripple and Shiba Inu Giveaways Proliferate on YouTube Live
Scammers are leveraging compromised YouTube accounts to promote fake cryptocurrency giveaways for Bitcoin, Ethereum, Dogecoin, Cardano, Ripple, Shiba Inu and other cryptocurrencies.