OpenSSL version 3.0.5 fixes a flaw that could potentially lead to RCE
The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution....
The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution....
Among the various offensive security techniques, vulnerability assessment takes priority when it comes to analyzing the security of IoT/IIoT devices....
Hotel chain Marriott International suffered a new data breach, a threat actor has stolen 20GB from the company. Hotel chain...
We explore Trend Micro’s latest research into industrial cybersecurity, including the impact of attacks, maturity of security programs, and recommendations...
We recently found a new ransomware family, which we have dubbed as HavanaCrypt, that disguises itself as a legitimate Google...
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate...
Experts observed an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Resecurity, a Los...
Threat actors are abusing legitimate adversary simulation software BRc4 in their campaigns to evade detection. Researchers from Palo Alto Networks...
NCSC urges organisations to prepare for the long haul on Russia-Ukraine UK organisations offered guidance on maintaining cyber security staff...
Brendan Carr, the commissioner of the FCC (Federal Communications Commission), called on the CEOs of Apple and Google to remove...
Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method....
Two insiders and an accomplice were indicted on Tuesday for multiple counts of fraud. According to documents unsealed by the...
Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered...
Iran’s Fars News Agency reported that a massive cyberattack hit operating systems and servers of the Tel Aviv Metro. Iran’s...
The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing...
Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and...
The vulnerability disclosure platform HackerOne has revealed that one of their staff members had improperly accessed security reports for personal...
AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re...
Google addressed a high-severity zero-day Chrome vulnerability actively exploited in the wild, it is the fourth zero-day patched in 2022....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Threat actors claim to have breached a database belonging to Shanghai police and stole the data of a billion Chinese...
The development team behind the Django Project has addressed a high-severity SQL Injection flaw in its framework. Django is a...
A new bill entered into both the House of Representatives and the Senate proposes the strongest Federal data privacy protections...
Bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports submitted to claim additional bounties The vulnerability...