admin
June 5, 2024
Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging...
admin
June 5, 2024
An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and...
admin
June 5, 2024
Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices...
admin
June 5, 2024
Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to...
admin
June 4, 2024
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was...
admin
June 4, 2024
A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to...
admin
June 4, 2024
Russian organizations are at the receiving end of cyber attacks that have been found to deliver a...
admin
June 4, 2024
Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server...
admin
June 4, 2024
Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out...
admin
June 4, 2024
Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey...
admin
June 4, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Oracle...
admin
June 3, 2024
Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to...
admin
June 3, 2024
Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the...
admin
June 3, 2024
Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations...
admin
June 3, 2024
Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain...
admin
June 3, 2024
The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called...
admin
June 3, 2024
Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware...
admin
June 1, 2024
Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces...
admin
June 1, 2024
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline...
admin
May 31, 2024
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across...