LastPass revealed that intruders had internal access for four days during the August hack
The Password management solution LastPass revealed that the threat actors had access to its systems for four days during the...
The Password management solution LastPass revealed that the threat actors had access to its systems for four days during the...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds new vulnerabilities to its Known Exploited Vulnerabilities Catalog, including the bug...
Bitdefender has released a free decryptor to allow the victims of the LockerGoga ransomware to recover their files without paying...
North Korea-linked threat actor UNC4034 is spreading tainted versions of the PuTTY SSH and Telnet client. In July 2022, Mandiant...
Uber on Thursday disclosed a security breach, threat actors gained access to its network, and stole internal documents. Uber on...
An unusual malicious bundle (a collection of malicious programs distributed in the form of a single installation file, self-extracting archive...
Akamai announced to have recently blocked a new record-breaking distributed denial-of-service (DDoS) attack. On Monday, September 12, 2022, Akamai mitigated...
Discover how red teaming can help reduce cyber risk across your ever-expanding digital attack surface. If you like the site,...
Cloud-native application security solutions consist of various tools, each with its own objective - learn what security challenges CNAPP solves....
Threat actors target gamers looking for cheats on YouTube with the RedLine Stealer information-stealing malware and crypto miners Researchers from...
Russia-linked Gamaredon APT targets employees of the Ukrainian government, defense, and law enforcement agencies with a custom information-stealing malware. Russia-linked...
The FBI has issued an alert about threat actors targeting healthcare payment processors in an attempt to hijack the payments....
Threat actors are exploiting the death of Queen Elizabeth II as bait in phishing attacks to steal Microsoft account credentials...
This blog entry details how Trend Micro Cloud One™ – Workload Security and Trend Micro Vision One™ effectively detected and...
CISA added more security flaws to its Known Exploited Vulnerabilities Catalog, including Windows and iOS flaws. The U.S. Cybersecurity and Infrastructure...
China-linked SparklingGoblin APT was spotted using a Linux variant of a backdoor known as SideWalk against a Hong Kong university....
Twitter whistleblower, and former head of security, Peiter Zatko, told the US Congress that the platform ignored his security concerns. Peiter...
Threat actors are actively exploiting a zero-day vulnerability in the WPGateway premium plugin to target WordPress websites. The Wordfence Threat...
Microsoft released September 2022 Patch Tuesday security updates to address 64 flaws, including an actively exploited Windows zero-day. Microsoft September...
As private 5G networks continue to roll-out, CISOs and security leaders need to fully aware of the security implications to...
A cyber espionage group targets governments and state-owned organizations in multiple Asian countries since early 2021. Threat actors are targeting...
Trend Micro addressed multiple vulnerabilities in its Apex One endpoint security product, including actively exploited zero-day flaws. Trend Micro announced...
Iran-linked threat actors target individuals specializing in Middle Eastern affairs, nuclear security and genome research. In mid-2022, Proofpoint researchers uncovered...
A massive cyberattack hit Montenegro, officials believe that it was launched by pro-Russian hackers and the security services of Moscow....