Ransomware operators love them: Key trends in the Initial Access Broker space
In a threat actor’s mind, take out the legwork, reap the proceeds of blackmail. Read more from the Source
WP Briefing: Episode 14: The Art and Science of Accessibility
In this episode, Josepha Haden Chomphosy discusses the nuances of building accessible software, the differences between access, usability, and accessibility, and how this all applies to the WordPress project. Have…
PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.
Cybersecurity researchers on Monday disclosed a set of nine vulnerabilities known as “PwnedPiper” that left a widely-used pneumatic tube system (PTS) vulnerable to critical attacks, including a possibility of complete…
New APT Hacking Group Targets Microsoft IIS Servers with ASP.NET Exploits
A new highly capable and persistent threat actor has been targeting major high-profile public and private entities in the U.S. as part of a series of targeted cyber intrusion attacks…

