Are You Willing to Pay the High Cost of Compromised Credentials?
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83%...
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83%...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the...
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat actor codenamed...
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based...
Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools like ChatGPT are...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the...
TikTok is flooded with videos promoting fake nude celebrity photo leaks used to push referral rewards for the Temu online...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
A novel and sophisticated backdoor malware named 'Deadglyph' was seen used in a cyberespionage attack against a government agency in...
A stealthy advanced persistent threat (APT) tracked as Gelsemium was observed in attacks targeting a Southeast Asian government that spanned...
U.S. educational nonprofit National Student Clearinghouse has disclosed a data breach affecting 890 schools using its services across the United...
Image Credit: John McArthur (Unsplash) Air Canada, the flag carrier and the largest airline of Canada, disclosed a cyber security incident...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon...
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain...
Security researchers discovered a multi-step information stealing campaign where hackers breach the systems of hotels, booking sites, and travel agencies...
T-Mobile has denied suffering another data breach following Thursday night reports that a threat actor leaked a large database allegedly...
The Government of British overseas territory Bermuda has linked a cyberattack affecting all its departments' IT systems since Thursday to...
Ethereum blockchain analytics firm Nansen asks a subset of its users to reset passwords following a recent data breach at...
Security researchers with the Citizen Lab and Google's Threat Analysis Group (TAG) revealed today that three zero-days patched by Apple...
Kosi Goodness Simon-Ebo, a 29-year-old Nigerian national extradited from Canada to the United States last April, pleaded guilty to wire...
The City of Dallas, Texas, said this week that the Royal ransomware attack that forced it to shut down all...
The UK’s National Cyber Security Centre (NCSC) looked to burnish its tech credentials this week with the publication of new...
Apple has patched three zero-day vulnerabilities it claims may have been actively exploited in the wild on iOS devices.CVE-2023-41991 is...