admin
March 26, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws to its Known Exploited Vulnerabilities...
admin
March 26, 2024
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) sanctioned three cryptocurrency exchanges for...
admin
March 25, 2024
Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as well as the...
admin
March 25, 2024
In January 2024, Microsoft discovered they’d been the victim of a hack orchestrated by Russian-state hackers Midnight Blizzard (sometimes...
admin
March 25, 2024
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used...
admin
March 25, 2024
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing...
admin
March 24, 2024
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting...
admin
March 24, 2024
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data,...
admin
March 23, 2024
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been...
admin
March 22, 2024
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom...
admin
March 22, 2024
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information...
admin
March 22, 2024
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows...
admin
March 22, 2024
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability...
admin
March 22, 2024
The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple...
admin
March 22, 2024
The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine, new...
admin
March 21, 2024
The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization...
admin
March 21, 2024
New research has discovered over 800 packages in the npm registry which have discrepancies from their registry...
admin
March 21, 2024
Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's used to target Laravel applications and...
admin
March 21, 2024
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential...
admin
March 21, 2024
GitHub on Wednesday announced that it's making available a feature called code scanning autofix in public beta...