Protecting your business with Wazuh: The open source security platform
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape...
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape...
Over one million WordPress websites are estimated to have been infected by an ongoing campaign to deploy malware called Balada...
As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily lives, cybercrime is...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities (KEV)...
The Dutch government will upgrade the security of its internet routing by adopting before the end of 2024 the Resource...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
A threat group called ARES is gaining notoriety on the cybercrime scene by selling and leaking databases stolen from corporations and...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber attack on its...
The stakes are high when it comes to cybersecurity. No longer are we dealing with unskilled hackers trying to break...
Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web browser to address a pair of zero-day...
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise...
The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw that could be...
On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors...
For-profit companies reportedly linked to sextortion activity are targeting victims using various deceptive tactics to pressure them into paying for...
Proof-of-concept exploit code has been released for a recently disclosed critical vulnerability in the popular VM2 library, a JavaScript sandbox that...
An estimated one million WordPress websites have been compromised during a long-lasting campaign that exploits "all known and recently discovered...
Following reports of a ransomware attack, Taiwanese PC vendor MSI (short for Micro-Star International) confirmed today that its network was...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat actors...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing...
A joint international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of...
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of...