admin
November 5, 2024
Over 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda...
admin
November 5, 2024
An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in...
admin
November 5, 2024
Canadian law enforcement authorities have arrested an individual who is suspected to have conducted a series of...
admin
November 5, 2024
Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously analyzing...
admin
November 5, 2024
Taiwanese network-attached storage (NAS) appliance maker Synology has addressed a critical security flaw impacting DiskStation and BeePhotos...
admin
November 5, 2024
Google has warned that a security flaw impacting its Android operating system has come under active exploitation...
admin
November 4, 2024
German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it...
admin
November 4, 2024
This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went...
admin
November 4, 2024
Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be...
Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)
5 min read
admin
November 4, 2024
As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and...
admin
November 4, 2024
Google said it discovered a zero-day vulnerability in the SQLite open-source database engine using its large language...
admin
November 4, 2024
Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs...
admin
November 1, 2024
U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting...
admin
November 1, 2024
Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private...
admin
November 1, 2024
With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections,...
admin
November 1, 2024
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract...
admin
November 1, 2024
Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting...
admin
October 31, 2024
Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only...
admin
October 31, 2024
LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack,...
admin
October 31, 2024
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred...