CISA Adds Three Security Flaws with Active Exploitation to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate...
The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams...
In 2023, the cloud isn't just a technology—it's a battleground. Zenbleed, Kubernetes attacks, and sophisticated APTs are just the tip...
U.S. cybersecurity and intelligence agencies have released a joint advisory about a cybercriminal group known as Scattered Spider that's known...
An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six...
Samsung Electronics is notifying some of its customers of a data breach that exposed their personal information to an unauthorized...
Distributed Denial of Service (DDoS) attacks certainly come to mind when considering cyberattacks that can cause widespread outages and service...
Toyota Financial Services (TFS) has confirmed that it detected unauthorized access on some of its systems in Europe and Africa...
Fortinet is alerting customers of a critical OS command injection vulnerability in FortiSIEM report server that could be exploited by...
The Californian City of Long Beach is warning that they suffered a cyberattack on Tuesday that has led them to...
MySQL servers are being targeted by the 'Ddostf' malware botnet to enslave them for a DDoS-as-a-Service platform whose firepower is...
The Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency released an advisory about the evasive threat actor...
Multiple vulnerabilities were identified in IBM WebSphere Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Police in Ukraine and Czechia claim to have disrupted a multimillion-dollar fraud gang who called victims impersonating bank staff, using...
Almost half (29) of the 60 ransomware groups tracked by WithSecure in 2023 began operations this year, the security vendor...
A prolific ransomware group appears to have reported one of its victims to the US Securities and Exchange Commission (SEC),...
Notorious Russian nation-state threat actor Sandworm has been linked to the largest ever cyber-attack targeting critical infrastructure in Denmark.The incident...
With Black Friday and Cyber Monday around the corner, anti-malware provider Malwarebytes has warned about the rise of credit card...
Cybersecurity researchers have uncovered a charity attack exploiting the ongoing events in Gaza and Israel. Cyber-criminals targeted 212 individuals across...
The Cloud Security Alliance (CSA) has introduced the Certificate of Competence in Zero Trust (CCZT), the industry’s inaugural authoritative zero...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformThe 1E-Exchange-URLResponseTime instruction that is part of the Network product...
What do basketball teams, government agencies, and car manufacturers have in common? Each one has been breached, having confidential, proprietary,...
Russian threat actors have been possibly linked to what's been described as the "largest cyber attack against Danish critical infrastructure,"...