45% of technology leaders have been involved in a SaaS cybersecurity breach.

Top 5 ransomware groups and the ransomware they deliver in 2024

Cofense Intelligence has announced research revealing the most prominent five ransomware groups. The ransomware groups are:  LockBit 3.0 BlackCat BianLian Akira BlackSuit Among RaaS groups, LockBit 3.0 is the most active. This organization predominantly targets the healthcare and public health sector, utilizing a variety or approaches such as IABs, phishing campaigns and direct attacks. A […]

8 Security Flaws Discovered in macOS Operating System for Microsoft Applications

8 vulnerabilities have been discovered in macOS operating system Microsoft apps by researchers from Cisco Talos. These vulnerabilities allow a malicious actor to bypass the permission model of the OS using existing permissions without further user verification. Exploiting these vulnerabilities could give an attacker privileges within the targeted application, such as sending emails, recording video […]

Cyber criminals focus their attacks on the manufacturing sector

Critical Start has recently published its biannual Cyber Threat Intelligence Report, highlighting the top threat trends witnessed in the first half of 2024. This encompasses emerging cybersecurity threats affecting industries like manufacturing, technology, healthcare, engineering and construction, and professional services. Noteworthy discoveries from the report include: Manufacturing emerges as the primary target industry for malicious […]

National Security Experts Address Public Data Breach

National Public Data, a background checking organization, experienced a breach potentially affecting 2.9 billion individuals. The breach exposed personally identifiable information (PII) such as names, phone numbers, mailing addresses, email addresses, and Social Security numbers.  “Organizations rely on the exchange of data for their vitality,” says Clyde Williamson, Product Management, Innovations at Protegrity. “Consumers share […]

Recent Study Reveals: Cybercriminals are Mimicking Tech Corporations

New research from Cado Security reveals that malicious actors are imitating tech companies in an effort to compromise corporate systems. Researchers discovered a typosquatting threat, in which malicious actors register domains that closely mimic an already existing domain. This is often done by replacing symbols with other, similar looking ones, such as swapping the letter […]

Microsoft Entra ID vulnerability allows for authentication bypass

Recent studies have revealed that Microsoft Entra ID (formerly Azure AD), a cloud-based identity and access management solution, can be exploited to bypass security protocols. Cybercriminals have found ways to manipulate the credential validation process, turning the pass-through authentication (PTA) agent into a tool that enables unauthorized access as any AD user. This opens up […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.