admin
February 4, 2023
A zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application is being actively exploited in the...
admin
February 3, 2023
Cybersecurity is quickly becoming one of the most significant growth drivers for Managed Service Providers (MSPs). That's...
admin
February 3, 2023
Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely...
admin
February 3, 2023
In a continuing sign that threat actors are adapting well to a post-macro world, it has emerged that...
admin
February 3, 2023
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as...
admin
February 3, 2023
Atlassian has released fixes to resolve a critical security flaw in Jira Service Management Server and Data...
admin
February 3, 2023
F5 has warned of a high-severity flaw impacting BIG-IP appliances that could lead to denial-of-service (DoS) or...
admin
February 3, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on February 2 added two security flaws to its Known Exploited...
admin
February 2, 2023
The State Cyber Protection Centre (SCPC) of Ukraine has called out the Russian state-sponsored threat actor known...
admin
February 2, 2023
Over the past few years, cybersecurity has become a major concern for businesses around the globe. With...
admin
February 2, 2023
A new intelligence gathering campaign linked to the prolific North Korean state-sponsored Lazarus Group leveraged known security...
admin
February 2, 2023
At least 1,200 Redis database servers worldwide have been corralled into a botnet using an "elusive and...
admin
February 1, 2023
Cybersecurity researchers have disclosed details of two security flaws in the open source ImageMagick software that could potentially lead...
admin
February 1, 2023
A new exploit has been devised to "unenroll" enterprise- or school-managed Chromebooks from administrative control.
Enrolling ChromeOS devices...
admin
February 1, 2023
A new attack campaign has targeted the gaming and gambling sectors since at least September 2022, just...
admin
February 1, 2023
The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared their head...
admin
February 1, 2023
Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard,...
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email Accounts

3 min read
admin
February 1, 2023
Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were...
admin
February 1, 2023
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software,...
admin
January 31, 2023
Do you know where your secrets are? If not, I can tell you: you are not alone.
Hundreds...