admin
November 26, 2024
Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated...
admin
November 26, 2024
The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation of two security...
admin
November 26, 2024
The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called...
admin
November 26, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting...
admin
November 25, 2024
Google has introduced a new feature called Restore Credentials to help users restore their account access to...
admin
November 25, 2024
The administrators of the Python Package Index (PyPI) repository have quarantined the package "aiocpa" following a new...
admin
November 25, 2024
We hear terms like “state-sponsored attacks” and “critical vulnerabilities” all the time, but what’s really going on...
admin
November 25, 2024
Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called Bring Your Own Vulnerable...
admin
November 23, 2024
The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10...
admin
November 23, 2024
Government agencies and non-governmental organizations in the United States have become the target of a nascent China...
admin
November 22, 2024
Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email,...
admin
November 22, 2024
Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations...
admin
November 22, 2024
The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called...
admin
November 22, 2024
A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage...
admin
November 22, 2024
Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime...
admin
November 22, 2024
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated...
admin
November 21, 2024
As a relatively new security category, many security operators and executives I’ve met have asked us “What...
admin
November 21, 2024
As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of...
admin
November 21, 2024
The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux...
admin
November 21, 2024
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you...