FTC orders non-bank financial firms to report breaches in 30 days
The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data breach...
The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data breach...
Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as...
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst...
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could be weaponized by...
A new ransomware-as-a-service brand named Hunters International has emerged using code used by the Hive ransomware operation, leading to the...
The Austrian police have arrested 20 people across the country linked to an illegal IPTV network that, between 2016 and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
Image: CCSD The Clark County School District (CCSD) in Nevada is dealing with a potentially massive data breach, as hackers...
HackerOne has announced that its bug bounty programs have awarded over $300 million in rewards to ethical hackers and vulnerability...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
New findings have shed light on what's said to be a lawful attempt to covertly intercept traffic originating from jabberru...
The North Korean Lazarus hacking group repeatedly compromised a software vendor using flaws in vulnerable software despite multiple patches and warnings...
A critical vulnerability in the F5 BIG-IP configuration utility, tracked as CVE-2023-46747, allows an attacker with remote access to the...
Ransomware attacks are increasing significantly, with reports indicating that last month was a record month for ransomware attacks in 2023....
The Pwn2Own Toronto 2023 hacking competition has ended with security researchers earning $1,038,500 for 58 zero-day exploits (and multiple bug...
Leading CISOs have offered best practices for security leaders on how to manage cyber risks effectively during the ISC2 Security...
New cybersecurity rules and regulations offer security leaders a great opportunity to elevate their role at their organizations, boosting security...