admin
March 22, 2024
The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple...
admin
March 22, 2024
The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new...
admin
March 21, 2024
The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization...
admin
March 21, 2024
New research has discovered over 800 packages in the npm registry which have discrepancies from their registry...
admin
March 21, 2024
Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's used to target Laravel applications and...
admin
March 21, 2024
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential...
admin
March 21, 2024
GitHub on Wednesday announced that it's making available a feature called code scanning autofix in public beta...
admin
March 21, 2024
When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in...
admin
March 21, 2024
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Wednesday announced sanctions against two 46-year-old...
admin
March 21, 2024
Ivanti has disclosed details of a critical remote code execution flaw impacting Standalone Sentry, urging customers to...
admin
March 21, 2024
Atlassian has released patches for more than two dozen security flaws, including a critical bug impacting Bamboo Data...
admin
March 20, 2024
A novel denial-of-service (DoS) attack vector has been found to target application-layer protocols based on User Datagram...
admin
March 20, 2024
The U.S. Environmental Protection Agency (EPA) said it's forming a new "Water Sector Cybersecurity Task Force" to...
admin
March 20, 2024
Did you know that 79% of organizations are already leveraging Generative AI technologies? Much like the internet...
admin
March 20, 2024
Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware,...
admin
March 20, 2024
Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various...
admin
March 20, 2024
The Cyber Police of Ukraine has arrested three individuals on suspicion of hijacking more than 100 million emails and...
admin
March 19, 2024
Application programming interfaces (APIs) are the connective tissue behind digital modernization, helping applications and databases exchange data...
admin
March 19, 2024
Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware...
admin
March 19, 2024
A new phishing campaign is targeting U.S. organizations with the intent to deploy a remote access trojan...