A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active ...
An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089 ...
Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and ...
A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages ...
Installed on over 200,000 WordPress sites, CleanTalk's Spam protection, Anti-Spam, FireWall plugin is advertised as a ...
CISA flags Array Networks flaw CVE-2023-28461 for active exploitation; agencies urged to patch by December 16.
From state-sponsored hacks targeting telecom giants to critical vulnerabilities putting thousands at risk, this week’s news ...
Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps ...
China-linked Earth Estries uses GHOSTSPIDER malware to hack telecoms and governments globally, breaching 20+ entities.
Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC) and policy-as-code ...
Verizon DBIR shows 180% surge in vulnerability exploits. Learn Zero Trust principles to counter modern threats.
Discover how modern phishing attacks use advanced evasion techniques to bypass security and target sensitive data.