Urgent: New Security Flaws Discovered in NGINX Ingress Controller for Kubernetes
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could be weaponized by...
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could be weaponized by...
A new ransomware-as-a-service brand named Hunters International has emerged using code used by the Hive ransomware operation, leading to the...
The Austrian police have arrested 20 people across the country linked to an illegal IPTV network that, between 2016 and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
Image: CCSD The Clark County School District (CCSD) in Nevada is dealing with a potentially massive data breach, as hackers...
HackerOne has announced that its bug bounty programs have awarded over $300 million in rewards to ethical hackers and vulnerability...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
New findings have shed light on what's said to be a lawful attempt to covertly intercept traffic originating from jabberru...
The North Korean Lazarus hacking group repeatedly compromised a software vendor using flaws in vulnerable software despite multiple patches and warnings...
A critical vulnerability in the F5 BIG-IP configuration utility, tracked as CVE-2023-46747, allows an attacker with remote access to the...
Ransomware attacks are increasing significantly, with reports indicating that last month was a record month for ransomware attacks in 2023....
The Pwn2Own Toronto 2023 hacking competition has ended with security researchers earning $1,038,500 for 58 zero-day exploits (and multiple bug...
Leading CISOs have offered best practices for security leaders on how to manage cyber risks effectively during the ISC2 Security...
New cybersecurity rules and regulations offer security leaders a great opportunity to elevate their role at their organizations, boosting security...
Microsoft has described the Octo Tempest (aka Scattered Spider, 0ktapus, UNC3944) group as “one of the most dangerous financial criminal...
The UK’s National Cyber Security Centre (NCSC) has announced the launch of a new offering designed to prevent school users...
Generative AI is too beneficial to abandon despite the threats it poses to organizations, according to experts speaking at the...
Nigerian police have uncovered and shut down a cybercrime recruitment and training center in the country’s capital.A post on X...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed software vendor was...
Google has announced that it's expanding its Vulnerability Rewards Program (VRP) to compensate researchers for finding attack scenarios tailored to...
F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in unauthenticated remote code execution. The...
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols, it's essential for them to...
Cloudflare says the number of hyper-volumetric HTTP DDoS (distributed denial of service) attacks recorded in the third quarter of 2023...