Over 30% of Log4J apps use a vulnerable version of the library
Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a...
Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a...
Security researchers developed a new attack, which they named AutoSpill, to steal account credentials on Android during the autofill operation....
A law enforcement operation is rumored to be behind an outage affecting ALPHV ransomware gang's websites over the last 30...
Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether...
Kentucky health system Norton Healthcare has confirmed that a ransomware attack in May exposed personal information belonging to patients, employees,...
A new set of vulnerabilities in 5G modems by Qualcomm and MediaTek, collectively called "5Ghoul," impact 710 5G smartphone models...
Amazon's Customer Protection and Enforcement team has taken legal action against an underground store refund scheme that has resulted in...
Security researchers discovered a remote access trojan they named Krasue that is targeting Linux systems of telecommunications companies and managed...
Meta has announced that the immediate availability of end-to-end encryption for all chats and calls made through the Messenger app, as...
WordPress has released version 6.4.2 that addresses a remote code execution (RCE) vulnerability that could be chained with another flaw to...
The UK National Cyber Security Centre (NCSC) and Microsoft warn that the Russian state-backed actor "Callisto Group" (aka "Seaborgium" or...
As Genetic testing provider 23andMe faces multiple lawsuits for an October credential stuffing attack that led to the theft of...
Russian national Anatoly Legkodymov pleaded guilty to operating the Bitzlato cryptocurrency exchange that helped ransomware gangs and other cybercriminals launder...
Russian APT28 military hackers used Microsoft Outlook zero-day exploits to target multiple European NATO member countries, including a NATO Rapid...
A recent report has revealed that 40.2% of files stored on Google Drive contain sensitive data.The findings come from the...
A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized...
Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have...
A U.S. senator revealed today that government agencies worldwide demand mobile push notification records from Apple and Google users to...
Athena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams...
Austal USA, a shipbuilding company and a contractor for the U.S. Department of Defense (DoD) and the Department of Homeland...
Atlassian has published security advisories for four critical remote code execution (RCE) vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with...
Academic researchers developed a new side-channel attack called SLAM that exploits hardware features designed to improve security in upcoming CPUs...
More than a dozen malicious loan apps, which are generically named SpyLoan, have been downloaded more than 12 million times this...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about hackers actively exploiting a critical vulnerability in Adobe ColdFusion identified...