admin
April 14, 2023
The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign...
admin
April 14, 2023
Open source media player software provider Kodi has confirmed a data breach after threat actors stole the...
admin
April 14, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog,...
admin
April 14, 2023
In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats....
admin
April 13, 2023
Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing...
admin
April 13, 2023
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker...
admin
April 13, 2023
Popular instant messaging app WhatsApp on Thursday announced a new account verification feature that ensures that malware...
admin
April 13, 2023
An emerging Python-based credential harvester and a hacking tool named Legion are being marketed via Telegram as a way...
admin
April 13, 2023
The Transparent Tribe threat actor has been linked to a set of weaponized Microsoft Office documents in attacks targeting...
admin
April 13, 2023
Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior...
admin
April 13, 2023
The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and...
admin
April 13, 2023
OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt...
admin
April 12, 2023
Threat actors using hacking tools from an Israeli surveillanceware vendor named QuaDream targeted at least five members...
admin
April 12, 2023
Here's a hard question to answer: 'How many service accounts do you have in your environment?'. A...
admin
April 12, 2023
It's the second Tuesday of the month, and Microsoft has released another set of security updates to...
admin
April 12, 2023
Enterprise communications service provider 3CX confirmed that the supply chain attack targeting its desktop application for Windows and macOS...
Newly Discovered “By-Design” Flaw in Microsoft Azure Could Expose Storage Accounts to Hackers
3 min read
admin
April 11, 2023
A "by-design flaw" uncovered in Microsoft Azure could be exploited by attackers to gain access to storage...
admin
April 11, 2023
Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up...
admin
April 11, 2023
In today's perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats,...
admin
April 11, 2023
Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that was distributed via 13...