admin
October 13, 2022
What is the OWASP Top 10, and – just as important – what is it not? In...
admin
October 13, 2022
A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild to target...
admin
October 13, 2022
An advanced persistent threat (APT) actor known as Budworm targeted a U.S.-based entity for the first time in more...
admin
October 13, 2022
An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been observed deploying an Android...
admin
October 13, 2022
A threat actor tracked as Polonium has been linked to over a dozen highly targeted attacks aimed...
admin
October 12, 2022
Malicious actors are resorting to voice phishing (vishing) tactics to dupe victims into installing Android malware on...
admin
October 12, 2022
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams are more...
admin
October 12, 2022
Google on Wednesday officially rolled out support for passkeys, the next-generation authentication standard, to both Android and...
64,000 Additional Patients Impacted by Omnicell Data Breach – What is Your Data Breach Action Plan?

3 min read
admin
October 12, 2022
In April 2022, Omnicell reported a data breach affecting nearly 62,000 patients. The company has revealed that...
admin
October 12, 2022
A vulnerability in Siemens Simatic programmable logic controller (PLC) can be exploited to retrieve the hard-coded, global...
admin
October 12, 2022
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by...
admin
October 12, 2022
The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering...
admin
October 12, 2022
Microsoft’s Patch Tuesday update for the month of October has addressed a total of 85 security vulnerabilities,...
admin
October 11, 2022
A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a remote adversary...
admin
October 11, 2022
The White House has recently announced a $1 billion cyber security grant program that is designed to...
admin
October 11, 2022
Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and...
admin
October 11, 2022
The operators behind the BazaCall call back phishing method have continued to evolve with updated social engineering...
admin
October 11, 2022
Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and proxy products...
admin
October 10, 2022
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset employed by...
admin
October 10, 2022
Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control (C2) infrastructure...