Chrome and Firefox security updates resolve over 35 vulnerabilities, including a dozen high-severity bugs. The post Chrome 124, Firefox 125 Patch High...
Chrome and Firefox security updates resolve over 35 vulnerabilities, including a dozen high-severity bugs. The post Chrome 124, Firefox 125 Patch High...
Ivanti releases patches for 27 vulnerabilities in the Avalanche MDM product, including critical flaws leading to command execution. The post Ivanti Pa...
Thecreatorsofwidespreadmalwareprogramsoftenemployvarioustoolsthathindercodedetectionandanalysis,andAndroidmalwareisnoexception.Asanexampleofthis,dropp...
Cloud security specialists found data exposure risk associated with Azure, AWS, and Google Cloud command-line tools. The post Cloud Users Warned of Da...
Charles O. Parks III was arrested and charged with defrauding two cloud-services providers of $3.5 million. The post Cryptojacker Arrested, Charged fo...
PuTTY vulnerability CVE-2024-31497 allows attackers to compromise private keys and use them to forge signatures. The post Critical PuTTY Vulnerabilit...
Join this one-day virtual summit as we shine the spotlight on the shadowy dynamics of ransomware attacks and how you can best prepare your organizatio...
PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who fou...
Omni Hotels says customer information was compromised in a cyberattack claimed by the Daixin Team ransomware group. The post Omni Hotels Says Personal...
Foreign attackers have many more toolsets at their disposal, so we need to make sure we’re selective about our modeling, preparation and how we assess...
The RansomHub group has started leaking information allegedly stolen from Change Healthcare in February 2024. The post Ransomware Group Starts Leaking...
Kevin O’Connor knew he was a hacker by the time he was in Middle School. He went on to work for the NSA and is now director of threat research at Adlu...
Cisco Duo warns that breach exposed phone numbers, phone carriers, metadata and other logs that could lead to downstream social engineering attacks. T...
ICS malware Fuxnet allegedly used by Ukrainian Blackjack group to disrupt industrial sensors and other systems belonging to a Moscow infrastructure fi...
Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products. The post Juniper Networks Publishes Dozens of Ne...
The Dark Angels (Dunghill) ransomware group claims to have stolen 1 Tb of data from Nexperia, which is investigating the incident. The post Ransomware...
NightVision, an early stage startup in the application security testing space, has raised $5.4 million in seed funding. The post NightVision Raises $5...
Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. The post ...
Former security engineer Shakeeb Ahmed was sentenced to prison for hacking and defrauding cryptocurrency exchanges. The post Former Security Engineer ...
Authorities in Australia and the US have arrested and charged two individuals for developing and selling the Hive RAT. The post Two People Arrested in...