admin
October 22, 2024
Details have emerged about a now-patched security flaw in Styra's Open Policy Agent (OPA) that, if successfully...
admin
October 22, 2024
Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on...
admin
October 22, 2024
Service accounts are vital in any enterprise, running automated processes like managing applications or scripts. However, without...
admin
October 22, 2024
Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame...
admin
October 22, 2024
Cybersecurity researchers have discovered a number of suspicious packages published to the npm registry that are designed...
admin
October 22, 2024
VMware has released software updates to address an already patched security flaw in vCenter Server that could...
CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

2 min read
admin
October 22, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic...
admin
October 21, 2024
Pentest Checklists Are More Important Than Ever
Given the expanding attack surface coupled with the increasing sophistication of...
admin
October 21, 2024
Hi there! Here’s your quick update on the latest in cybersecurity.
Hackers are using new tricks to break...
admin
October 21, 2024
The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti)...
admin
October 21, 2024
Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could...
admin
October 20, 2024
Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube...
admin
October 19, 2024
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM,...
admin
October 19, 2024
A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks...
admin
October 18, 2024
North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not...
admin
October 18, 2024
Microsoft has disclosed details about a now-patched security flaw in Apple's Transparency, Consent, and Control (TCC) framework...
admin
October 18, 2024
Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces...
U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

3 min read
admin
October 18, 2024
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken...
admin
October 18, 2024
Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed...
admin
October 17, 2024
The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks...