CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform...
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform...
Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass,...
The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use...
The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use...
Discount store chain Dollar Tree was impacted by a third-party data breach affecting 1,977,486 people after the hack of service...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass,...
Google has released an update for Chrome to fix several new vulnerabilities, including one rated high severity that is currently...
Security experts have urged ownCloud customers to mitigate a critical zero-day vulnerability in its “graphapi” app announced last week, after...
Security researchers have uncovered a new design flaw in the Google Workspace Domain-Wide Delegation feature. Named “DeleFriend” by Hunters’ Team Axon, the vulnerability could...
Threat actors have been observed exploiting a critical vulnerability, CVE-2023-46604, in Apache systems. Over the past few weeks, Fortiguard Labs identified multiple...
Threat intelligence-sharing platform VirusTotal has unveiled new research showing how AI can be used by cyber defenders to enhance malware...
A worrying 17% of the UK’s small and medium-sized businesses (SMBs) can’t always spot the tell-tale signs of online fraud...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
As the demand for anytime, anywhere access to services and information increases, our dependency on web-based applications deepens. From business...
Okta's investigation into the breach of its Help Center environment last month revealed that the hackers obtained data belonging to...
The Japan Aerospace Exploration Agency (JAXA) was hacked in a cyberattack over the summer, which may have put sensitive space-related...
Russia-linked ransomware gang Black Basta has raked in at least $100 million in ransom payments from more than 90 victims...
CISA (Cybersecurity & Infrastructure Security Agency) is warning that threat actors breached a U.S. water facility by hacking into Unitronics...
The U.S. Department of the Treasury has sanctioned the Sinbad cryptocurrency mixing service for its use as a money-laundering tool...
Amir Hossein Golshan, 25, was sentenced to eight years in prison by a Los Angeles District Court and ordered to...
In a rapidly evolving digital landscape, it's crucial to reevaluate how we secure web environments. Traditional antivirus-approach solutions have their...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a cyber attack that involved the active...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it's responding to a cyber attack that involved the active...