Ivanti warns of new actively exploited MobileIron zero-day bug
US-based IT software company Ivanti warned customers today that a critical Sentry API authentication bypass vulnerability is being exploited in...
US-based IT software company Ivanti warned customers today that a critical Sentry API authentication bypass vulnerability is being exploited in...
A notorious Russian-speaking ransomware group has updated its attack tooling to include a Veeam exploit designed to harvest logins, according...
An intelligence analyst working for police in the North West of England shared information about a major countrywide operation with...
The government is urging more schools to enrol their students in a government scheme designed to boost cyber skills, claiming...
Cyber-criminals have been exploiting fraudulent artificial intelligence (AI) bots to attempt and install malicious software under the guise of genuine...
Federally insured credit unions have been notified by the National Credit Union Administration (NCUA) of a new regulation set to...
Google has announced an update set to be introduced in Chrome 117. This new feature aims to proactively inform users...
Foreign intelligence services could use direct and supply chain cyber-attacks to gain access to the US space industry, according to US...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infofoldingathome -- client_advanced_controlAn issue was discovered in FoldingAtHome Client Advanced Control GUI...
Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them...
The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconnaissance and targeting...
From a user's perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation...
Image: Midjourney The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
Serde, a popular Rust (de)serialization project, has decided to ship its serde_derive macro as a precompiled binary. The move has generated a fair...
The China-aligned APT (advanced persistent threat) group known as 'Bronze Starlight' was seen targeting the Southeast Asian gambling industry with...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and redirection toolkit called WoofLocker that's engineered to conduct...
Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis. That's according...
Networking hardware company Juniper Networks has released an "out-of-cycle" security update to address multiple flaws in the J-Web component of...
A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can...
While there was quite a bit of ransomware news this week, the highlighted story was the release of Jon DiMaggio's...
An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation...
Security researchers have discovered a new financially motivated cyber-threat campaign designed to make money from cryptomining and proxyjacking while staying...