admin
October 11, 2022
A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a remote adversary...
admin
October 11, 2022
The White House has recently announced a $1 billion cyber security grant program that is designed to...
admin
October 11, 2022
Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and...
admin
October 11, 2022
The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering...
admin
October 11, 2022
Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and proxy products...
admin
October 10, 2022
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by...
admin
October 10, 2022
Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control (C2) infrastructure...
admin
October 10, 2022
Chipmaker Intel has confirmed that proprietary source code related to its Alder Lake CPUs has been leaked,...
admin
October 10, 2022
BNB Chain, a blockchain linked to the Binance cryptocurrency exchange, disclosed an exploit on a cross-chain bridge...
admin
October 8, 2022
A severe remote code execution vulnerability in Zimbra's enterprise collaboration software and email platform is being actively...
admin
October 8, 2022
Microsoft on Friday disclosed it has made more improvements to the mitigation method offered as a means to prevent exploitation attempts...
admin
October 8, 2022
Fortinet has privately warned its customers of a security flaw affecting FortiGate firewalls and FortiProxy web proxies...
admin
October 7, 2022
Meta Platforms on Friday disclosed that it had identified over 400 malicious apps on Android and iOS...
admin
October 7, 2022
Understanding the connection between GRC and cybersecurity
When talking about cybersecurity, Governance, Risk, and Compliance (GRC) is often...
admin
October 7, 2022
Multiple campaigns that distributed trojanized and typosquatted packages on the NPM open source repository have been identified...
admin
October 7, 2022
In what's a new phishing technique, it has been demonstrated that the Application Mode feature in Chromium-based...
admin
October 7, 2022
In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte...
admin
October 6, 2022
It's been a year since the release of The Ultimate SaaS Security Posture Management (SSPM) Checklist. If...
admin
October 6, 2022
The threat actor behind the malware-as-a-service (MaaS) called Eternity has been linked to new piece of malware...
admin
October 6, 2022
Security researchers have shared details about a now-addressed security flaw in Apple's macOS operating system that could...