New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS...
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS...
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS...
OpenNDS has released security updates addressing a critical vulnerability (CVE-2023-41101) in their OpenNDS product, a service providing a border control...
A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized...
Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have...
A U.S. senator revealed today that government agencies worldwide demand mobile push notification records from Apple and Google users to...
Athena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams...
Austal USA, a shipbuilding company and a contractor for the U.S. Department of Defense (DoD) and the Department of Homeland...
Atlassian has published security advisories for four critical remote code execution (RCE) vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with...
Academic researchers developed a new side-channel attack called SLAM that exploits hardware features designed to improve security in upcoming CPUs...
A UK facility containing the world’s largest stockpile of civil plutonium has been breached by hackers linked to Russia and...
A prolific Russian state-sponsored APT group is actively exploiting a known vulnerability in Outlook to access email accounts in Exchange...
Although US federal agencies have made progress in preparing for and responding to cyber threats, too many have failed to...
New legal requirements to check users’ ages before they can access pornography online could create serious security and privacy risks,...
Security researchers have uncovered a surge in deceptive Android loan apps since the beginning of 2023. These applications, posing as legitimate...
Brand impersonation in cyber-attacks has reached new levels of sophistication, a recent research article by Abnormal Security has highlighted. Traditionally observed in...
Global law enforcers have arrested just over 1000 individuals suspected of money laundering, and identified thousands more, in a new...
The UK’s financial regulator has warned UK households struggling with the high cost of living to be on the lookout...
A substantial 78% of CISOs have expressed concerns about the current unmanageability of application security (AppSec) attack surfaces, emphasizing the...
Security researchers have identified a new threat involving cracked applications distributed by unauthorized websites, concealing a Trojan-Proxy designed to compromise...
Legal experts have warned that a “landmark” ruling by the European Court of Justice (ECJ) could have major financial ramifications...
The LockBit ransomware strain continues to be the primary digital extortion threat to all regions, and almost all industries globally,...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoapache -- dolphinschedulerExposure of Sensitive Information to an Unauthorized Actor vulnerability in...
More than a dozen malicious loan apps, which are generically named SpyLoan, have been downloaded more than 12 million times this...