admin
February 28, 2023
The threat actor known as Blind Eagle has been linked to a new campaign targeting various key...
admin
February 28, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework to its...
admin
February 28, 2023
LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access encrypted...
admin
February 27, 2023
The RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30% in 2022,...
admin
February 27, 2023
Spoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over 4,371 additional...
admin
February 27, 2023
A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking...
admin
February 27, 2023
Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an...
admin
February 27, 2023
The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg in...
admin
February 27, 2023
The Dutch police announced the arrest of three individuals in connection with a "large-scale" criminal operation involving...
admin
February 24, 2023
Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android.
While...
admin
February 24, 2023
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major...
admin
February 24, 2023
The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat...
admin
February 24, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber...
admin
February 24, 2023
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered...
admin
February 23, 2023
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by...
admin
February 23, 2023
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems.
Jamf...
admin
February 23, 2023
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine...
admin
February 23, 2023
The (Other) Risk in Finance
A few years ago, a Washington-based real estate developer received a document link...
admin
February 23, 2023
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct...
admin
February 23, 2023
An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new...