Investment scams are on the rise
Preying on one of the most basic human flaws, investment scams and other get-rich-quick schemes are making up an ever...
Preying on one of the most basic human flaws, investment scams and other get-rich-quick schemes are making up an ever...
The Russia-linked Gamaredon APT group attempted to compromise an unnamed Western government entity in Ukraine. Palo Alto Networks’ Unit 42...
An alleged Chinese threat actor is actively attempting to exploit a zero-day vulnerability in the Zimbra open-source email platform. An...
Office 365 and Azure Active Directory (Azure AD) customers were the targets of billions of brute-force and phishing attacks last...
Six years ago the Powerful Greek Army (PGA) appeared in the threat landscape. After a long breach the hacker collective...
How useful is the Codex code generator as a potential training tool? If you like the site, please consider joining...
Dive into a hands-on comparison of Azure Resource Manager templates and Terraform. This article highlights the primary features of each...
In April of 2021, Apple introduced AirTags to the world, making the small tracking devices—similar to a Tile— available for...
Cisco released security patches to address multiple flaws in its Small Business RV160, RV260, RV340, and RV345 series routers. Cisco...
A China-linked APT group tracked as Antlion used a custom backdoor called xPack that was undetected for months. A China-linked...
A cyber attack hit the oil terminals of some of the biggest European ports impacting their operations. Some of the...
If you’re a YouTuber, watch out for bogus Opera missives winging their way to you. The Browser team has had...
By using an exploit in the software of crypto-trading platform Wormhole, threat actors have stolen an estimated $322 million in...
Threat actors have stolen $325Â million in cryptocurrency leveraging a bug in the Wormhole communication bridge. Wormhole, one of the most...
Trend Micro recently addressed two high-severity flaws affecting some of its hybrid cloud security products. Trend Micro released security updates...
Information on the latest Samba vulnerability and how to protect systems against the threats that can exploit it. If you...
Securing the hybrid cloud can be complex. Explore how CISOs can use the zero trust security approach for more proactive...
Security researcher discovered an Information Disclosure vulnerability in Brave browser and reported it through the HackerOne platform. Security researcher Kirtikumar...
Cyber security team at retail giant Walmart dissected a new ransomware family dubbed Sugar, which implements a ransomware-as-a-service model. The...
A cyberattack has disrupted the activities in Germany of fuel supplier Oiltanking Deutschland GmbH & Co. KG. The supplier is,...
Antivirus firm ESET addressed a local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. Antivirus firm ESET released security...
The Cybereason Nocturnus Team reported a spike in the activity of the Iran-linked APT group APT35 (aka Phosphorus or Charming Kitten). The Cybereason...
Why do machines always throw a tantrum when you are in a hurry? It’s called Murphy’s Law which some people...
Researchers discovered tens of vulnerabilities in UEFI firmware code used by the major device manufacturers. Researchers at firmware security company...