Critical Vulnerability in Apache OFBiz Requires Immediate Patching
Organizations utilizing Apache OFBiz have been warned to promptly address a critical vulnerability due to escalating exploitation attempts targeting a...
Organizations utilizing Apache OFBiz have been warned to promptly address a critical vulnerability due to escalating exploitation attempts targeting a...
TikTok has agreed to permanently withdraw its ‘Lite Rewards’ program from the EU in response to EU Commission concerns about...
A new report from HP Wolf Security has highlighted the growing danger from threat actors targeting physical device supply chains...
Eighty-six percent of respondents have identified unknown organizational cyber-risks as a top concern, according to the Critical Start 2024 Cyber Risk...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to...
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called...
Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable threat actors to...
Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such...
Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial...
A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute...
The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software updates...
The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform...
Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter Notebooks. The activity, codenamed...
The US Environmental Protection Agency (EPA) urgently needs to address rising cyber risks to water and wastewater systems, a new...
The UK’s National Cyber Security Centre (NCSC) has set out plans to launch a new version of its Active Cyber...
The UK’s Information Commissioner’s Office (ICO) has put 11 social media and video sharing platforms “on notice” for failing to...
The gaming industry has faced a 94% increase in layer 7 distributed denial-of-service (DDoS) attacks over the past year.According to...
A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing...
A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties...
In today's digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer...
Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service (BITS)...
Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These...
Cybersecurity companies are warning about an uptick in the abuse of Clouflare's TryCloudflare free service for malware delivery. The activity,...