admin
January 9, 2024
Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S., European Union, and Latin...
admin
January 9, 2024
Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, Miro, and others promote the collaborative...
admin
January 9, 2024
A security flaw has been disclosed in Kyocera’s Device Manager product that could be exploited by bad actors to...
admin
January 9, 2024
Threat actors are resorting to YouTube videos featuring content related to cracked software in order to entice...
Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy
10 min read
admin
January 8, 2024
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon...
admin
January 8, 2024
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s...
admin
January 8, 2024
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit...
admin
January 8, 2024
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that...
admin
January 8, 2024
The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with the now-defunct...
admin
January 8, 2024
Threat actors affiliated with the Democratic People's Republic of Korea (also known as North Korea) have plundered...
admin
January 6, 2024
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have...
admin
January 6, 2024
The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice.
The findings come from cybersecurity company...
admin
January 5, 2024
Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that...
admin
January 5, 2024
A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks with an...
admin
January 5, 2024
Picture this: you stumble upon a concealed secret within your company's source code. Instantly, a wave of...
admin
January 5, 2024
Mobile network operator Orange Spain suffered an internet outage for several hours on January 3 after a...
admin
January 5, 2024
Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager (EPM) solution that,...
admin
January 5, 2024
Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar's...
admin
January 4, 2024
Section four of the "Executive Order on Improving the Nation’s Cybersecurity" introduced a lot of people in...
admin
January 4, 2024
Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository with capabilities...