admin
April 5, 2024
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the...
admin
April 5, 2024
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan.
The starting point of...
admin
April 5, 2024
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by...
admin
April 5, 2024
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti...
admin
April 4, 2024
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries...
admin
April 4, 2024
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the...
admin
April 4, 2024
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical...
admin
April 4, 2024
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct...
admin
April 4, 2024
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways...
admin
April 3, 2024
Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the...
admin
April 3, 2024
The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that...
admin
April 3, 2024
Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC)...
admin
April 3, 2024
Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they’re not...
admin
April 3, 2024
The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target...
admin
April 3, 2024
A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information...
admin
April 2, 2024
The malicious code inserted into the open-source library XZ Utils, a widely used package present in major...
admin
April 2, 2024
Cloud solutions are more mainstream – and therefore more exposed – than ever before.
In 2023 alone, a...
Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement
2 min read
admin
April 2, 2024
Google has agreed to purge billions of data records reflecting users' browsing activities to settle a class...
admin
April 2, 2024
The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide...
admin
April 1, 2024
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other...