By Christoph Nagy, CEO of SecurityBridge
To detect attacks on SAP, you need to evaluate the security logs in SAP.
While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we…
Source: www.cyberdefensemagazine.com – Read more

Hazy Hawk Exploits Organizations’ DNS Gaps to Abuse Cloud Resources & Deliver Malware
Security researchers have identified a threat actor called “Hazy Hawk” that is hijacking abandoned cloud resources from prominent organisations to distribute scams and malware. The