Security researchers have revealed a highly sophisticated Linux rootkit named Singularity, which can bypass Elastic Security’s endpoint detection and response (EDR) mechanisms. T...
Stay Updated! Stay Secured!
Cyber Threat Post has been launched with an objective to be a prominent source of key information being updated in real-time to protect business-critical assets against cyber attacks and unforeseen cyber risks.
Infoshare Varutra's Managed SOC team at Cyber Defence Center closely works with our Threat Intelligence experts in hunting for vulnerabilities worldwide and publishing security advisories along with easy to implement, real actionable recommendations to help business IT Teams.
The Symantec Threat Hunter Team has uncovered two major cyber intrusions targe...
Attackers based in China are taking advantage of vulnerabilities in Cisco ASA,...
Conduent Business Services, LLC (“Conduent”), a major back-office services...
Threat intelligence researchers have discovered an expanding campaign where cy...
Researchers published a proof-of-concept called Brash that exploits an archite...
A sophisticated multilingual phishing campaign has recently been uncovered tar...
Be the first to receive the updates on the latest Cyber Threats and the recommendations from our industry leaders to secure your business from such attacks.
Contact us at ctp-back3nd@infosharesystems.com for more details.