New Star Blizzard spear-phishing campaign targets WhatsApp accounts Threat intelligence | Microsoft Security Blog
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions Threat intelligence | Microsoft Security Blog
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine Threat intelligence | Microsoft Security Blog
Privacy-Preserving Federated Learning – Future Collaboration and Continued Research NIST | Cybersecurity Insights
NIST’s International Cybersecurity and Privacy Engagement Update – New Translations NIST | Cybersecurity Insights
Operation Talent: An international law enforcement operation seized Cracked, Nulled and other cybercrime websites Security Affairs
Insurance companies can reduce risk with Attack Path Management Posts By SpecterOps Team Members - Medium
From Assessment to Action: The Red Siege Security Posture Review Is Here Blog – Red Siege Information Security
Bug Bounty Radar // The latest bug bounty programs for March 2023 The Daily Swig | Cybersecurity news and views
Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses The Daily Swig | Cybersecurity news and views
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits Threat Analysis Group (TAG)