Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency
Multiple threat actors, including a nation-state group, exploited a critical three-year-old security flaw in Progress Telerik to break into an...
Multiple threat actors, including a nation-state group, exploited a critical three-year-old security flaw in Progress Telerik to break into an...
In last year's edition of the Security Navigator we noted that the Manufacturing Industry appeared to be totally over-represented in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion to its...
A cyberespionage actor known as Tick has been attributed with high confidence to a compromise of an East Asian data-loss...
The stakes could not be higher for cyber defenders. With the vast amounts of sensitive information, intellectual property, and financial...
Cybersecurity researchers have discovered the first-ever illicit cryptocurrency mining campaign used to mint Dero since the start of February 2023....
A previously undocumented threat actor dubbed YoroTrooper has been targeting government, energy, and international organizations across Europe as part of...
A fake ChatGPT-branded Chrome browser extension has been found to come with capabilities to hijack Facebook accounts and create rogue...
A widespread malicious cyber operation has hijacked thousands of websites aimed at East Asian audiences to redirect visitors to adult-themed...
The National Institute of Standards and Technology (NIST) is one of the standard-bearers in global cybersecurity. The U.S.-based institute's cybersecurity...
Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon,...
Microsoft's Patch Tuesday update for March 2023 is rolling out with remediations for a set of 80 security flaws, two...
Government entities and large organizations have been targeted by an unknown threat actor by exploiting a security flaw in Fortinet...
Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat...
An open source adversary-in-the-middle (AiTM) phishing kit has found a number of takers in the cybercrime world for its ability...
A new Golang-based malware dubbed GoBruteforcer has been found targeting web servers running phpMyAdmin, MySQL, FTP, and Postgres to corral...
New ‘supply chain mapping’ guidance Supply chain mapping is the process of recording, storing and using information gathered from suppliers...
Zero trust migration: How will I know if I can remove my VPN? As your organisation makes the transition to...
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar...
Researchers at the School of Cyber Security at Korea University, Seoul, have presented a new covert channel attack named CASPER...
Essendant, a wholesale distributor of stationary and office supplies, is experiencing a multi-day systems "outage" preventing customers and suppliers from...
Threat actors linked to the IceFire ransomware operation now actively target Linux systems worldwide with a new dedicated encryptor. SentinelLabs...
AT&T is notifying roughly 9 million customers that some of their information was exposed after a marketing vendor was hacked...
GitHub will start requiring active developers to enable two-factor authentication (2FA) on their accounts beginning next week, on March 13....