admin
June 28, 2023
A ransomware threat called 8Base that has been operating under the radar for over a year has...
admin
June 28, 2023
Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead to remote code execution...
admin
June 27, 2023
A new process injection technique dubbed Mockingjay could be exploited by threat actors to bypass security solutions...
admin
June 27, 2023
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution...
Beyond Asset Discovery: How Attack Surface Management Prioritizes Vulnerability Remediation

4 min read
admin
June 27, 2023
As the business environment becomes increasingly connected, organizations’ attack surfaces continue to expand, making it challenging to...
admin
June 27, 2023
Europol on Tuesday announced that the takedown of EncroChat in July 2020 led to 6,558 arrests worldwide and the...
admin
June 27, 2023
A new Android malware campaign has been observed pushing the Anatsa banking trojan to target banking customers...
admin
June 27, 2023
Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network access control...
admin
June 26, 2023
Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And...
admin
June 26, 2023
In what's an ingenious side-channel attack, a group of academics has found that it's possible to recover secret...
admin
June 26, 2023
An unknown cryptocurrency exchange located in Japan was the target of a new attack earlier this month...
admin
June 26, 2023
The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in...
admin
June 26, 2023
Microsoft has disclosed that it's detected a spike in credential-stealing attacks conducted by the Russian state-affiliated hacker...
admin
June 24, 2023
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities...
admin
June 24, 2023
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced...
admin
June 24, 2023
A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO) industry with persistent attacks that...
admin
June 24, 2023
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security
Have you ever...
admin
June 24, 2023
A new strain of JavaScript dropper has been observed delivering next-stage payloads like Bumblebee and IcedID.
Cybersecurity firm...
admin
June 24, 2023
The U.S. National Security Agency (NSA) on Thursday released guidance to help organizations detect and prevent infections...
admin
June 24, 2023
Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new...