It's time for a new security approach. Replace traditional security technology that exposes your attack surface and allows ...
The tech giant said the attack involves sending phishing emails that masquerade as Microsoft Teams meeting invitations that, ...
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise ...
Researchers have uncovered a sustained and ongoing campaign by Russian spies that uses a clever phishing technique to hijack ...
First identified by cybersecurity firm Volexity in February 2022, the attack raises new concerns about vulnerabilities in corporate Wi-Fi system. In this case, APT28, tracked by Volexity as ...
Researchers at the Google Cloud-owned cybersecurity specialist confirmed findings from Volexity researchers about exploitation of the Connect Secure VPN vulnerabilities. Mandiant researchers ...
Volexity researchers who first discovered flaws affecting widely used Ivanti VPN devices now say the vulnerabilities are seeing widespread exploitation by multiple threat actors. In its own update ...
In a blog post, Volexity says that two zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) are being actively exploited to compromise ICS VPN appliances. "Exploitation of these ...