admin
March 5, 2024
More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets...
admin
March 5, 2024
The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim...
admin
March 5, 2024
A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be...
admin
March 4, 2024
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate...
admin
March 4, 2024
A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and...
admin
March 4, 2024
As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging...
admin
March 4, 2024
U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the...
admin
March 2, 2024
A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to...
admin
March 2, 2024
The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian national for his...
admin
March 1, 2024
A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency services as part...
admin
March 1, 2024
GitHub on Thursday announced that it’s enabling secret scanning push protection by default for all pushes to...
admin
March 1, 2024
More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize failures at scale.
John...
admin
March 1, 2024
Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) called BIFROSE (aka...
admin
March 1, 2024
The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors...
admin
February 29, 2024
Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be deployed in telecom networks that...
admin
February 29, 2024
The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the Windows Kernel as...
admin
February 29, 2024
As an IT leader, staying on top of the latest cybersecurity developments is essential to keeping your...
admin
February 29, 2024
Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can be successful even in cases where...
admin
February 29, 2024
At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed to the exploitation...
admin
February 29, 2024
A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European countries with Indian diplomatic missions...