180+ OAuth 2.0 cloud malware apps detected
Proofpoint offices in Toronto, Canada. (Raysonho @ Open Grid Scheduler / Scalable Grid Engine, CC0, via Wikimedia Commons)Researchers issued a...
Proofpoint offices in Toronto, Canada. (Raysonho @ Open Grid Scheduler / Scalable Grid Engine, CC0, via Wikimedia Commons)Researchers issued a...
A recent cyberattack has forced The Alaska Court System (ACS) to temporarily discontinue its online services to the public including...
FireEye, the intelligence-led security company, published the FireEye Mandiant M-Trends 2021 report. The FireEye-owned forensic specialist’s M-Trends 2021 report was...
The press service of the Russian Ministry of Internal Affairs reported that employees of the department have been using a...
According to many press reports and the San Diego Union-Tribune, the San Diego-based Scripps Health still tries to assemble certain...
In a surge of cyberattacks that began last week, a new ransomware group known as 'N3TW0RM' is targeting Israeli companies. N3TW0RM,...
Introduction to KubeArmorKubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access,...
For complete documentation visit www.botkube.io BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug...
A new cybercrime gang, tracked as UNC2529, has targeted many organizations in the US and other countries using new sophisticated...
Cyber Defense Magazine March 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 90 pages of...
Researchers found a critical vulnerability in HPE Edgeline Infrastructure Manager that could be exploited by a remote attacker to bypass...
A massive distributed denial of service (DDoS) attack shut down Belgiums’ government websites, internal networks were also impacted. A massive...
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers...
Summary: CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation...
Summary: An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where,...
Summary: A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute...
Summary: Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains...
Summary: GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to...
Spectre is the name for a whole class of vulnerabilities discovered in January 2018 that affected huge numbers of modern...
Around 7:20 a.m. on Monday, May 3, 2021, the database was first made public on a prominent Russian hacker website....
UK cybersecurity organization TurgenSec has reported over 345,000 important credential files were leaked from the Filipino solicitor-general office including information...
Swiss Cloud, a Switzerland-based cloud hosting provider, suffered a ransomware attack that seriously impacted its server infrastructure. The incident took...
Cybersecurity agency Group-IB and UNICC carried out a joint venture where they took down 134 websites handled by hacking group...
Two researchers have shown how a Tesla and probably other cars can be remotely hacked without the involvement of the...