admin
January 24, 2024
In today’s highly distributed workplace, every employee has the ability to act as their own CIO, adopting...
admin
January 24, 2024
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable...
admin
January 24, 2024
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by...
admin
January 24, 2024
A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer (MFT) software that could...
admin
January 24, 2024
In a world where more & more organizations are adopting open-source components as foundational blocks in their...
admin
January 24, 2024
Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for...
admin
January 23, 2024
As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication in which...
admin
January 23, 2024
The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity...
admin
January 23, 2024
Two malicious packages discovered on the npm package registry have been found to leverage GitHub to store...
admin
January 23, 2024
Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of...
admin
January 23, 2024
Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his...
admin
January 23, 2024
Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian Confluence Data...
admin
January 23, 2024
Apple on Monday released security updates for iOS, iPadOS, macOS, tvOS, and Safari web browser to address...
admin
January 22, 2024
We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we found.
Digging into...
admin
January 22, 2024
Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate...
admin
January 22, 2024
Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a...
admin
January 22, 2024
Several public and popular libraries abandoned but still used in Java and Android applications have been found...
admin
January 22, 2024
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket...
admin
January 22, 2024
Cybersecurity researchers are warning of a "notable increase" in threat actor activity actively exploiting a now-patched flaw...
admin
January 20, 2024
An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and...