Globant suffers network breach due to LAPSUS$ compromise
Globant, an IT and software development firm with offices all around the globe, recently admitted in a press statement Wednesday...
Globant, an IT and software development firm with offices all around the globe, recently admitted in a press statement Wednesday...
Apple has released security updates for macOS Monterey 12.3.1, iOS 15.4.1, iPadOS 15.4.1, tvOS 15.4.1, and watchOS 8.5.1. The update...
Ransomware authors are once again targeting health services, holding important files to ransom and impacting potentially vital services. On this...
Anonymous continues its operations against Russia, the group announced the hack of the Russian investment firm Marathon Group. Anonymous continues...
Researchers spotted a new destructive wiper, tracked as AcidRain, that is likely linked to the recent attack against Viasat. Security...
Zyxel issued security updates for a critical vulnerability that affects some of its business firewall and VPN devices. Networking equipment...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Sophos firewall flaw and seven other issues to...
Wyze Cam devices are affected by three security vulnerabilities that can allow attackers to takeover them and access camera feeds....
For the Lazarus threat actor, financial gain is one of the prime motivations, with a particular emphasis on the cryptocurrency...
Cybersecurity can be complex work, as security teams need to regularly decipher and prioritize alerts, protect against daily threats, and...
Apple released emergency patches to address two zero-day vulnerabilities actively exploited to compromise iPhones, iPads, and Macs. Apple has released...
Calendars are a rich source of bad behaviour for scammers and spammers. They’re one of the most prolific tools the...
The Malwarebytes Threat Intelligence team has identified a malvertising campaign targeting Japanese users. The campaign they discovered was found to...
There’s a flaw in the way many of the world’s most popular messaging and email platforms—such as Facebook Messenger, Instagram,...
The Google TAG uses uncovered phishing attacks targeting Eastern European and NATO countries, including Ukraine. The Google Threat Analysis Group (TAG) provided...
The Anonymous collective hacked the Russian investment firm Thozis Corp, but it’s a mystery the attack against the Russian Civil...
Given current world events, there’s an incredible amount of misinformation and disinformation around at the moment. Whether we’re talking 5G,...
An unauthenticated zero-day RCE vulnerability in the Spring Core Java framework called ‘Spring4Shell’ has been publicly disclosed. Researchers disclosed a...
The Morphisec Labs researchers analyzed a new malware, tracked as Mars stealer, which is based on the older Oski Stealer. Morphisec...
In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)...
SonicWall released security updates to address a remote code execution vulnerability that affects multiple firewall appliances. SonicWall has released security...
The US CISA and the Department of Energy issued guidance on mitigating attacks against uninterruptible power supply (UPS) devices. The...
The Lapsus$ extortion group claims to have hacked IT giant Globant and leaked tens of gigabytes of stolen data. The...
Google has launched Chrome version 100 which, among other things, fixes 28 vulnerabilities. Other new security features include Safety Check,...