Data Breaches in SaaS: Why Two-Thirds of Organizations Are at Risk
Data breaches in SaaS applications are a growing concern, with recent findings showing that one-third of organizations have been victims....
Data breaches in SaaS applications are a growing concern, with recent findings showing that one-third of organizations have been victims....
In a new cyber-espionage campaign, a South Korean APT has exploited a WPS Office zero-day vulnerability to deploy a sophisticated...
Money laundering has emerged as the most prevalent type of fraud by value in UK courts, with significant increases in...
In a major data breach, the MOVEit file transfer software has put the personal data of over half a million...
A recently disclosed vulnerability in Microsoft 365 Copilot has exposed significant risks to user data, raising concerns among organizations worldwide....
A former IT engineer is facing serious charges after an alleged plot to extort his previous employer in Missouri. This...
LummaC2, a potent infostealer malware, has resurfaced with advanced obfuscated PowerShell techniques threatening sensitive data integrity. LummaC2 is an infostealer...
Iranian hackers have been implicated in aiding ransomware attacks on US organizations, showcasing a concerning trend in cyber espionage. Read...
The newly identified Tickler backdoor, crafted by the Iran-backed Peach Sandstorm hacking group, poses significant risks to various sectors. Peach...
Ransomware attacks on US schools have dramatically increased, exposing 6.7 million records since 2018. This pressing issue highlights the urgent...
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which...
French prosecutors on Wednesday formally charged CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain...
A South Korea-aligned cyber espionage has been linked to the zero-day exploitation of a now-patched critical remote code execution flaw...
The threat actors behind the BlackByte ransomware group have been observed likely exploiting a recently patched security flaw impacting VMware...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw affecting the Apache OFBiz open-source...
Cybersecurity researchers are calling attention to a new QR code phishing (aka quishing) campaign that leverages Microsoft Sway infrastructure to...
A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a...
Want to know what's the latest and greatest in SecOps for 2024? Gartner's recently released Hype Cycle for Security Operations...
The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of...