admin
February 24, 2023
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major...
admin
February 24, 2023
The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat...
admin
February 24, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber...
admin
February 24, 2023
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered...
admin
February 23, 2023
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by...
admin
February 23, 2023
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems.
Jamf...
admin
February 23, 2023
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine...
admin
February 23, 2023
The (Other) Risk in Finance
A few years ago, a Washington-based real estate developer received a document link...
admin
February 23, 2023
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct...
admin
February 23, 2023
An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new...
admin
February 23, 2023
Cybersecurity researchers are warning of "imposter packages" mimicking popular libraries available on the Python Package Index (PyPI)...
admin
February 22, 2023
Apple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS, and macOS.
The first...
admin
February 22, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities...
admin
February 22, 2023
In what's a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the npm repository...
admin
February 22, 2023
If you Google "third-party data breaches" you will find many recent reports of data breaches that were...
admin
February 22, 2023
Shipping companies and medical laboratories in Asia have been the subject of a suspected espionage campaign carried...
admin
February 22, 2023
An open source command-and-control (C2) framework known as Havoc is being adopted by threat actors as an...
admin
February 22, 2023
At the beginning of January, Gcore faced an incident involving several L3/L4 DDoS attacks with a peak...
admin
February 22, 2023
VMware on Tuesday released patches to address a critical security vulnerability affecting its Carbon Black App Control...
admin
February 21, 2023
A sophisticated botnet known as MyloBot has compromised thousands of systems, with most of them located in...