TELUS investigating leak of stolen source code, employee data
Canada's second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what appears to...
Canada's second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what appears to...
The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat detection, incident response,...
Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android. While the Android...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber vigilance, as Russia's...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan...
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered "serious loopholes" that...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to...
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by the...
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct set of tools....
The (Other) Risk in Finance# A few years ago, a Washington-based real estate developer received a document link from First...
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine products since January...
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs,...
Cybersecurity researchers are warning of "imposter packages" mimicking popular libraries available on the Python Package Index (PyPI) repository. The 41...
At the beginning of January, Gcore faced an incident involving several L3/L4 DDoS attacks with a peak volume of 650...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
An open source command-and-control (C2) framework known as Havoc is being adopted by threat actors as an alternative to other...
Apple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS, and macOS....
Shipping companies and medical laboratories in Asia have been the subject of a suspected espionage campaign carried out by a...
If you Google "third-party data breaches" you will find many recent reports of data breaches that were either caused by...
In what's a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the npm repository in...
VMware on Tuesday released patches to address a critical security vulnerability affecting its Carbon Black App Control product. Tracked as...
A sophisticated botnet known as MyloBot has compromised thousands of systems, with most of them located in India, the U.S.,...
Popular cryptocurrency exchange platform Coinbase disclosed that it experienced a cybersecurity attack that targeted its employees. The company said its...