Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with...
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with...
In today's highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and...
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack...
A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer (MFT) software that could be abused to...
In a world where more & more organizations are adopting open-source components as foundational blocks in their application's infrastructure, it's...
Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for his alleged role...
The Australian, US, and UK governments have announced sanctions for Aleksandr Gennadievich Ermakov, a Russian national considered responsible for the 2022...
Veolia North America, a subsidiary of transnational conglomerate Veolia, disclosed a ransomware attack that impacted systems part of its Municipal Water...
Jason's Deli is warning of a data breach in notifications sent to customers of its online platform stating that their...
X, formerly Twitter, announced today that iOS users in the United States can now log into their accounts using passkeys....
Exploit code is now available for a critical authentication bypass vulnerability in Fortra's GoAnywhere MFT (Managed File Transfer) software that...
Fortra is warning of a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) versions before 7.4.1 that allows...
An exposed Trello API allows linking private email addresses with Trello accounts, enabling the creation of millions of data profiles...
A recently uncovered ransomware operation named 'Kasseika' has joined the club of threat actors that employs Bring Your Own Vulnerable...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
A new 12TB database of 26 billion records has been found exposed online by security researchers, although its contents were...
The Australian government has publicly named a Russian cybercriminal as responsible for the Medibank data breach, which affected 9.7 million...
A US regulator has confirmed that its official X (formerly Twitter) account was hijacked earlier this month after hackers were...
LoanDepot, one of the largest US-based retail mortgage lenders, has confirmed that around 16.6 million of its customers have had...
The UK government has published a new Code of Practice on cybersecurity governance, targeting directors and other senior business leaders.The...
Amazon France Logistique, a subsidiary of the e-commerce giant that manages its large warehouses in France, has been fined €32m...
Security researchers have uncovered two new malicious packages on the npm open source package manager that utilized GitHub to store...
Security experts are observing attempts to exploit the remote code execution (RCE) vulnerability CVE-2023-22527 affecting outdated Atlassian Confluence servers. The company disclosed the...