admin
March 27, 2024
As SaaS applications dominate the business landscape, organizations need optimized network speed and robust security measures. Many...
admin
March 27, 2024
Cybersecurity researchers are warning that threat actors are actively exploiting a "disputed" and unpatched vulnerability in an...
admin
March 27, 2024
A new phishing campaign has been observed leveraging a novel loader malware to deliver an information stealer...
admin
March 27, 2024
Two China-linked advanced persistent threat (APT) groups have been observed targeting entities and member countries affiliated with...
admin
March 26, 2024
Minecraft, with over 500 million registered users and 166 million monthly players, faces significant risks from distributed...
admin
March 26, 2024
Threat hunters have identified a suspicious package in the NuGet package manager that's likely designed to target developers working...
admin
March 26, 2024
The U.S. Department of Justice (DoJ) on Monday unsealed indictments against seven Chinese nationals for their involvement...
admin
March 26, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities...
admin
March 26, 2024
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned three cryptocurrency exchanges for...
admin
March 25, 2024
Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the...
admin
March 25, 2024
In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes...
admin
March 25, 2024
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used...
admin
March 25, 2024
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing...
admin
March 24, 2024
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting...
admin
March 24, 2024
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data,...
admin
March 23, 2024
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been...
admin
March 22, 2024
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom...
admin
March 22, 2024
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information...
admin
March 22, 2024
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows...
admin
March 22, 2024
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability...