admin
November 28, 2023
As cloud technology evolves, so does the challenge of securing sensitive data. In a world where data...
admin
November 28, 2023
Cybersecurity researchers have detailed a "severe design flaw" in Google Workspace's domain-wide delegation (DWD) feature that could...
admin
November 28, 2023
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result,...
admin
November 28, 2023
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are...
admin
November 28, 2023
Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have...
admin
November 28, 2023
Cybersecurity researchers have discovered a case of "forced authentication" that could be exploited to leak a Windows...
admin
November 28, 2023
The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed...
admin
November 28, 2023
If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click,...
admin
November 27, 2023
A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host...
admin
November 27, 2023
The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for...
admin
November 25, 2023
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what’s suspected...
admin
November 25, 2023
The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could...
admin
November 24, 2023
More details have emerged about a malicious Telegram bot called Telekopye that's used by threat actors to pull off...
admin
November 24, 2023
The title of this article probably sounds like the caption to a meme. Instead, this is an...
admin
November 24, 2023
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed...
admin
November 24, 2023
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of...
admin
November 23, 2023
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable...
admin
November 23, 2023
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab.
"The malware...
admin
November 23, 2023
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application...
admin
November 23, 2023
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals....