Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform
Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep...
Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep...
Read the full article for key points from Intruder's VP of Product, Andy Hornegold's recent talk on exposure management. If...
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a...
A 33-year-old Latvian national living in Moscow, Russia, has been charged in the U.S. for allegedly stealing data, extorting victims,...
Cybersecurity researchers have uncovered a new information stealer that's designed to target Apple macOS hosts and harvest a wide range...
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
SolarWinds has issued patches to address a new security flaw in its Web Help Desk (WHD) software that could allow...
Details have emerged about a China-nexus threat group's exploitation of a recently disclosed, now-patched security flaw in Cisco switches as...
Cybersecurity researchers have uncovered a hardware backdoor within a particular model of MIFARE Classic contactless cards that could allow authentication...
As many as 15,000 applications using Amazon Web Services' (AWS) Application Load Balancer (ALB) for authentication are potentially susceptible to...
What is Continuous Attack Surface Penetration Testing or CASPT? Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is...
Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that's designed to mine cryptocurrency after brute-forcing their way into...
GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical...
Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could permit unauthenticated users...
Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that it said has...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
A new remote access trojan called MoonPeak has been discovered as being used by a state-sponsored North Korean threat activity...
Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft's Copilot Studio that could be exploited to access sensitive information....
It's no great revelation to say that SaaS applications have changed the way we operate, both in our personal and...
In what's a case of an operational security (OPSEC) lapse, the operator behind a new information stealer called Styx Stealer...
Cybersecurity researchers have uncovered a new macOS malware strain dubbed TodoSwift that they say exhibits commonalities with known malicious software...
A maximum-severity security flaw has been disclosed in the WordPress GiveWP donation and fundraising plugin that exposes more than 100,000...