Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity
Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall...
Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall...
Fortinet has released updates addressing a critical vulnerability (CVE-2024-21762) in FortiOS. The vulnerability has a Common Vulnerability Scoring System (CVSS)...
Ivanti has released security updates to address a vulnerability (CVE-2024-22024) affecting Connect Secure, Policy Secure, and ZTA gateways. Successful exploitation...
LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used...
Data breaches at two French healthcare payment service providers, Viamedis and Almerys, have now been determined to impact over 33...
A new version of the XLoader Android malware was discovered that automatically executes on devices it infects, requiring no user...
Car maker Hyundai Motor Europe suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three...
The U.S. State Department offers rewards of up to $10 million for information that could help locate, identify, or arrest...
Today, Ivanti warned of a new authentication bypass vulnerability impacting Connect Secure, Policy Secure, and ZTA gateways, urging admins to...
Fortinet is warning that a new critical remote code execution vulnerability in FortiOS SSL VPN is potentially being exploited in attacks....
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices...
Linux developers have addressed a new security flaw discovered in Shim, a component crucial for the boot process in Linux-based...
Raspberry Robin, a malware initially identified in 2021, has demonstrated remarkable adaptability and sophistication in its recent operations, according to...
Threat actors are targeting operational technology (OT) and Internet of Things (IoT) environments with increasing sophistication and have a growing...
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some...
If you've listened to software vendors in the identity space lately, you will have noticed that "unified" has quickly become...
Google has unveiled a new pilot program in Singapore that aims to prevent users from sideloading certain apps that abuse...
The threat actors behind a loader malware called HijackLoader have added new techniques for defense evasion, as the malware continues...
The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously undocumented Golang-based information stealer called Troll...
Cisco, Fortinet, and VMware have released security fixes for multiple security vulnerabilities, including critical weaknesses that could be exploited to...
Ransomware payments in 2023 soared above $1.1 billion for the first time, shattering previous records and reversing the decline seen...
In the past, many organizations chose to trust users and devices within their secure perimeters. This is no longer possible,...
Chinese Volt Typhoon state hackers failed to revive a botnet recently taken down by the FBI, which was previously used in...
A critical vulnerability in the Shim Linux bootloader enables attackers to execute code and take control of a target system...