MITRE Reveals Top 25 Most Critical Software Flaws of 2024
Cross-site scripting has emerged as the most critical software flaw of the past year, highlighting significant security concerns in 2024....
Cross-site scripting has emerged as the most critical software flaw of the past year, highlighting significant security concerns in 2024....
In 2024, five ransomware groups, such as RansomHub and LockBit 3.0, were responsible for a staggering 40% of all cyber-attacks,...
A significant portion of UK enterprises are unsure about the application of the new NIS2 Directive, which may lead to...
In a significant breakthrough in cybersecurity, five individuals have been charged in the highly publicized Scattered Spider case, highlighting the...
Lumma Stealer is rapidly proliferating through Telegram, capturing a broad audience while evading traditional security measures. Read more about Lumma...
Recent findings reveal significant threats in Linux security from the newly identified malware strains, WolfsBane and FireWood. Recent findings reveal...
Google's OSS-Fuzz team has leveraged AI technology to uncover 26 previously hidden security vulnerabilities in open-source projects. This innovative approach...
Explore the distinct methods of infostealer malware families VietCredCare and DuckTail targeting Facebook accounts in Vietnam for illicit gain. Recent...
The BianLian ransomware group has recently updated its tactics, posing a growing threat to critical infrastructure organizations worldwide. This shift...
Ransomware attacks are increasingly aimed at weekends and holidays, when cybersecurity teams are often understaffed, according to a new Semperis...
Deepfake technology poses significant challenges in digital identity verification, with attacks happening every five minutes according to recent findings. Fraudsters...
In a shocking discovery, security researchers reveal how hackers are using hijacked Jupyter servers for illegal sports stream ripping, raising...
In recent findings, five privilege escalation vulnerabilities have been identified within the needrestart utility on Ubuntu Server. These flaws can...
Recent cybersecurity research reveals that 60% of emails containing QR codes are categorized as spam, with many even posing significant...
The Belt and Road Initiative (BRI) has become a focal point for strategic development, but it also attracts the attention...
As the adoption of AI technology accelerates, OWASP highlights the rising risks of data exposure via large language models (LLMs)...
Apple's latest emergency security update is crucial for protecting users from two actively exploited vulnerabilities in their devices. Apple has...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Organizations are often overly optimistic about the time needed to recover from serious cybersecurity incidents, with new findings revealing a...
A 42-year-old Russian national has been extradited to the US over allegations of managing the Phobos ransomware operation, a significant...
Jen Easterly, the Director of the US Cybersecurity and Infrastructure Security Agency (CISA), is scheduled to leave her role as...
T-Mobile's network has been compromised in a significant cyber-espionage operation involving the Chinese hacking group, Salt Typhoon. This breach raises...
Ransomware gangs are increasingly seeking penetration testers to bolster their operations in various affiliate programs. This recruitment drive highlights the...
Palo Alto Networks has released a crucial security patch addressing a critical vulnerability affecting its firewall management interfaces, emphasizing the...