Popular open source project Moq criticized for quietly collecting data
Open source project Moq (pronounced "Mock") has drawn sharp criticism for quietly including a controversial dependency in its latest release. Distributed...
Open source project Moq (pronounced "Mock") has drawn sharp criticism for quietly including a controversial dependency in its latest release. Distributed...
The widespread adoption of a digital transformation workspace and the shift to web applications has led to a global rise...
The Rhysida ransomware operation is making a name for itself after a wave of attacks on healthcare organizations has forced...
A phishing-as-a-service (PaaS) platform which may have been responsible for over 150,000 phishing domains has been taken offline after an...
The UK’s financial regulatory has warned consumers to be on the lookout for loan fee fraudsters after revealing new research...
Microsoft released updates for 87 vulnerabilities yesterday, including two that are being actively exploited in the wild.The first zero-day was...
A serious data leak has exposed the personal details of police officers and civilian personnel working at the Police Service...
The Missouri Department of Social Services (DSS) has issued an alert urging residents to safeguard their personal information following a...
The Rhysida ransomware group, a recent addition to the growing threat landscape, has been implicated in a string of high-impact...
A new security loophole has been found in Spring Security’s latest versions. Tracked as CVE-2023-34034, the flaw has a CVSS...
Multiple zero-day vulnerabilities have been discovered in some of the most used cryptographic multi-party computation (MPC) protocols, putting consumers’ cryptocurrency...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoyunyecms -- yunyecmsSQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to...
Hackers associated with China's Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia,...
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from...
Cyber-criminals continue to impersonate brands via well-crafted phishing websites. We previously covered attacks on both consumers and businesses via online searches...
Validate security continuously across your full stack with Pen Testing as a Service. In today's modern security operations center (SOC),...
The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected for over a...
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm...
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their...
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for...
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...