admin
April 25, 2023
Details have emerged about a high-severity security vulnerability impacting Service Location Protocol (SLP) that could be weaponized...
admin
April 25, 2023
An Iranian nation-state threat actor has been linked to a new wave of phishing attacks targeting Israel...
admin
April 25, 2023
A financially-motivated North Korean threat actor is suspected to be behind a new Apple macOS malware strain...
admin
April 25, 2023
Google's cloud division is following in the footsteps of Microsoft with the launch of Security AI Workbench that leverages generative AI...
admin
April 25, 2023
Search giant Google on Monday unveiled a major update to its 12-year-old Authenticator app for Android and iOS with...
admin
April 24, 2023
A recent review by Wing Security, a SaaS security company that analyzed the data of over 500...
admin
April 24, 2023
Threat actors have been observed leveraging a legitimate but outdated WordPress plugin to surreptitiously backdoor websites as...
admin
April 24, 2023
The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering intelligence in...
admin
April 24, 2023
Threat actors are employing a previously undocumented "defense evasion tool" dubbed AuKill that's designed to disable endpoint...
admin
April 24, 2023
A new "all-in-one" stealer malware named EvilExtractor (also spelled Evil Extractor) is being marketed for sale for other threat...
admin
April 24, 2023
Print management software provider PaperCut said that it has "evidence to suggest that unpatched servers are being...
admin
April 22, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known...
admin
April 22, 2023
Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two...
admin
April 21, 2023
Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native and Kubernetes Security...
admin
April 21, 2023
A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based Access Control (RBAC)...
admin
April 21, 2023
Cybersecurity researchers have disclosed details of a now-patched zero-day flaw in Google Cloud Platform (GCP) that could...
admin
April 21, 2023
Cisco and VMware have released security updates to address critical security flaws in their products that could...
admin
April 21, 2023
The supply chain attack targeting 3CX was the result of a prior supply chain compromise associated with...
admin
April 20, 2023
Why is Visibility into OT Environments Crucial?
The significance of Operational Technology (OT) for businesses is undeniable as...
admin
April 20, 2023
The notorious North Korea-aligned state-sponsored actor known as the Lazarus Group has been attributed to a new campaign aimed...