Webinar: Learn to Boost Cybersecurity with AI-Powered Vulnerability Management
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more...
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and attackers are becoming more...
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on August 29, the...
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm packages, once again...
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a zero-day by North...
On August 19, 2024, Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium, now identified as...
In the first half of 2024, vulnerabilities surged by an alarming 43% compared to the same period in 2023, highlighting...
Russian hackers are exploiting commercial spyware vulnerabilities to target specific victims, marking a significant cyber threat. In a world-first move,...
Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent...
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected...
Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself...
The most dangerous vulnerability you've never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at...
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to...
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry,...
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of...
Chinese-speaking users are the target of a "highly organized and sophisticated attack" campaign that is likely leveraging phishing emails to...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
An unpatched CCTV vulnerability is being targeted to spread a variant of Mirai malware, raising significant security concerns. An unpatched...
BlackByte, a ransomware group connected to the notorious Conti group, is now exploiting VMware ESXi vulnerabilities to compromise systems and...
In recent months, the rise of pig butchering scams has highlighted alarming trends in online fraud, as scammers adapt their...
A recent analysis highlights a surge in attacks linked to North Korean hackers, focusing on the npm ecosystem to compromise...
A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of...
Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to...