admin
August 22, 2024
As many as 15,000 applications using Amazon Web Services' (AWS) Application Load Balancer (ALB) for authentication are...
admin
August 22, 2024
What is Continuous Attack Surface Penetration Testing or CASPT?
Continuous Penetration Testing or Continuous Attack Surface Penetration Testing...
admin
August 22, 2024
Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that...
admin
August 22, 2024
Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could...
admin
August 22, 2024
GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product,...
admin
August 22, 2024
Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that's designed to mine cryptocurrency after brute-forcing...
admin
August 21, 2024
Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft's Copilot Studio that could be exploited to...
admin
August 21, 2024
A new remote access trojan called MoonPeak has been discovered as being used by a state-sponsored North...
admin
August 21, 2024
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new phishing attacks that aim to...
admin
August 21, 2024
It's no great revelation to say that SaaS applications have changed the way we operate, both in...
admin
August 21, 2024
In what's a case of an operational security (OPSEC) lapse, the operator behind a new information stealer...
admin
August 21, 2024
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with...
admin
August 21, 2024
A maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes...
admin
August 20, 2024
As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is paramount....
admin
August 20, 2024
Mobile users in the Czech Republic are the target of a novel phishing campaign that leverages a...
admin
August 20, 2024
A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an...
admin
August 20, 2024
In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these...
admin
August 20, 2024
Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could...
admin
August 20, 2024
Iranian state-sponsored threat actors have been observed orchestrating spear-phishing campaigns targeting a prominent Jewish figure starting in...
admin
August 20, 2024
Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted...