admin
February 29, 2024
The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python Package Index (PyPI)...
admin
February 29, 2024
U.S. President Joe Biden has issued an Executive Order that prohibits the mass transfer of citizens' personal data to...
admin
February 28, 2024
An Iran-nexus threat actor known as UNC1549 has been attributed with medium confidence to a new set of attacks...
admin
February 28, 2024
The U.S. government is warning about the resurgence of BlackCat (aka ALPHV) ransomware attacks targeting the healthcare...
admin
February 28, 2024
In today's digital era, data privacy isn't just a concern; it's a consumer demand. Businesses are grappling...
admin
February 28, 2024
In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other countries are urging...
Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management
3 min read
Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management
admin
February 28, 2024
Traditional perimeter-based security has become costly and ineffective. As a result, communications security between people, systems, and...
admin
February 28, 2024
Mexican users have been targeted with tax-themed phishing lures at least since November 2023 to distribute a...
admin
February 27, 2024
A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable unauthenticated...
admin
February 27, 2024
An "intricately designed" remote access trojan (RAT) called Xeno RAT has been made available on GitHub, making it available...
admin
February 27, 2024
A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more than...
admin
February 27, 2024
Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional's role. Threat...
admin
February 27, 2024
Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving...
admin
February 27, 2024
Cybersecurity researchers have found that it's possible to compromise the Hugging Face Safetensors conversion service to ultimately...
admin
February 26, 2024
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial...
admin
February 26, 2024
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as...
admin
February 26, 2024
A set of fake npm packages discovered on the Node.js repository has been found to share ties...
admin
February 26, 2024
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10...
admin
February 26, 2024
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud...
admin
February 26, 2024
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure,...