admin
October 12, 2022
Malicious actors are resorting to voice phishing (vishing) tactics to dupe victims into installing Android malware on...
admin
October 12, 2022
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more...
admin
October 12, 2022
Google on Wednesday officially rolled out support for passkeys, the next-generation authentication standard, to both Android and...
64,000 Additional Patients Impacted by Omnicell Data Breach – What is Your Data Breach Action Plan?

3 min read
admin
October 12, 2022
In April 2022, Omnicell reported a data breach affecting nearly 62,000 patients. The company has revealed that...
admin
October 12, 2022
A vulnerability in Siemens Simatic programmable logic controller (PLC) can be exploited to retrieve the hard-coded, global...
admin
October 12, 2022
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by...
admin
October 12, 2022
The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering...
admin
October 12, 2022
Microsoft’s Patch Tuesday update for the month of October has addressed a total of 85 security vulnerabilities,...
admin
October 11, 2022
A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a remote adversary...
admin
October 11, 2022
The White House has recently announced a $1 billion cyber security grant program that is designed to...
admin
October 11, 2022
Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and...
admin
October 11, 2022
The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering...
admin
October 11, 2022
Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and proxy products...
admin
October 10, 2022
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by...
admin
October 10, 2022
Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control (C2) infrastructure...
admin
October 10, 2022
Chipmaker Intel has confirmed that proprietary source code related to its Alder Lake CPUs has been leaked,...
admin
October 10, 2022
BNB Chain, a blockchain linked to the Binance cryptocurrency exchange, disclosed an exploit on a cross-chain bridge...
admin
October 8, 2022
A severe remote code execution vulnerability in Zimbra's enterprise collaboration software and email platform is being actively...
admin
October 8, 2022
Microsoft on Friday disclosed it has made more improvements to the mitigation method offered as a means to prevent exploitation attempts...
admin
October 8, 2022
Fortinet has privately warned its customers of a security flaw affecting FortiGate firewalls and FortiProxy web proxies...