admin
October 30, 2023
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could be weaponized...
admin
October 30, 2023
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such...
admin
October 28, 2023
New findings have shed light on what's said to be a lawful attempt to covertly intercept traffic...
admin
October 27, 2023
The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor...
admin
October 27, 2023
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it's essential...
admin
October 27, 2023
Google has announced that it's expanding its Vulnerability Rewards Program (VRP) to reward researchers for finding attack...
admin
October 27, 2023
F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote...
admin
October 26, 2023
While cyberattacks on websites receive much attention, there are often unaddressed risks that can lead to businesses...
admin
October 26, 2023
A group of academics has devised a novel side-channel attack dubbed iLeakage that exploits a weakness in the A-...
admin
October 26, 2023
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as...
admin
October 26, 2023
Cloudflare on Thursday said it mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks that exploited a...
admin
October 26, 2023
Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to update to...
admin
October 26, 2023
A relatively new threat actor known as YoroTrooper is likely made of operators originating from Kazakhstan.
The assessment, which comes...
admin
October 26, 2023
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole attacks that...
admin
October 25, 2023
In today's digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as...
admin
October 25, 2023
The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail software on...
admin
October 25, 2023
Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online services such...
admin
October 25, 2023
Virtualization services provider VMware has alerted customers to the existence of a proof-of-concept (PoC) exploit for a...
admin
October 25, 2023
VMware has released security updates to address a critical flaw in the vCenter Server that could result...
admin
October 25, 2023
The popularity of Brazil's PIX instant payment system has made it a lucrative target for threat actors looking to generate illicit...