Two more malicious Python packages in the PyPI
On August 8, CheckPoint published a report on ten malicious Python packages in the Python Package Index (PyPI), the most...
On August 8, CheckPoint published a report on ten malicious Python packages in the Python Package Index (PyPI), the most...
Whether you want to block ads, keep a to-do list or check your spelling, browser extensions allow you to do...
This blog entry discusses what an OPA is and what it’s for, what we’ve discovered after identifying 389 exposed OPA...
Explore the top patch management best practices to mitigate the growing threat of vulnerability exploits in your organization. If you...
A cyber attack disrupted the IT operations of South Staffordshire Water, a company supplying drinking water to 1.6M consumers daily....
Russia-linked Gamaredon APT group targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad. Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive...
For about 1,900 users, Twilio hackers could have attempted to re-register their number to another device or learned that their...
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
Microsoft disrupted a hacking operation linked conducted by Russia-linked APT SEABORGIUM aimed at NATO countries. The Microsoft Threat Intelligence Center...
In the final part of our series, we look at the APT33 case study and several recommendations from our expert...
Researchers from threat intelligence firm Cyble reported a surge in attacks targeting virtual network computing (VNC). Virtual Network Computing (VNC) is...
Security researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA Android...
Security Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers have discovered a...
China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a...
Flaws in Xiaomi Redmi Note 9T and Redmi Note 11 models could be exploited to disable the mobile payment mechanism and even...
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity...
Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin. The...
C The NCSC is currently inviting organisations to help develop a new Cyber Advisor service. The initial 100 Cyber Advisor...
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers....
We found APT group Iron Tiger's malware compromising chat application Mimi’s servers in a supply chain attack. If you like...
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The...