CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND)...
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND)...
Read more coverage on the CrowdStrike IT outage: CrowdStrike Fault Causes Global IT Outages Cybercriminals Exploit CrowdStrike Outage ChaosCrowdStrike has...
Cybersecurity awareness training company KnowBe4 has revealed it was duped into hiring a fake IT worker from North Korea, resulting...
Google has been criticized for its decision to abandon plans to phase out third-party cookies in the Chrome browser, with...
Palo Alto Networks researchers have identified two vulnerabilities (CVE-2023-46229 and CVE-2023-44467) in LangChain, a popular open source generative AI framework...
Security questionnaires aren't just an inconvenience — they're a recurring problem for security and sales teams. They bleed time from...
The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to...
Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash...
There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have reached an era where purpose-built...
A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files...
A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
A vulnerability has been identified in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's...
Prolific Chinese espionage group Daggerfly (aka Evasive Panda, Bronze Highland) has extensively updated its malware toolkit, increasing its abilities to...
UK law enforcement agencies have infiltrated and taken down DigitallStress, the world’s most prolific underground marketplace offering distributed denial of...
Russia’s cyber activities in Ukraine have shifted away from strategic civilian targets towards pursuing tactical military objectives, according to a...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in...
Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in...
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice...
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest...
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its...
Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years...