Playbook: Your First 100 Days as a vCISO – 5 Steps to Success
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...