THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from...
Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from...
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing...
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of...
Last year, a U.S. federal agency's Microsoft Internet Information Services (IIS) web server was hacked by exploiting a critical .NET...
Security researchers have shared technical details for exploiting a critical Microsoft Outlook vulnerability for Windows (CVE-2023-23397) that allows hackers to remotely...
A threat actor is selling on a Russian-speaking hacking forum what they claim to be hundreds of gigabytes of data...
CISA has added a critical vulnerability impacting Adobe ColdFusion versions 2021 and 2018 to its catalog of security bugs exploited...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...
An advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to conduct espionage. The group's...
Mozilla has announced the integration of Firefox Relay, an email protection system that helps users evade trackers and spammers, directly...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...
Latitude Financial Services (Latitude) has disclosed a data breach after suffering a cyberattack, causing the company to shut down internal...
In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine...
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for...
A convincing Twitter scam is targeting bank customers by abusing the quote-tweet feature, as observed by BleepingComputer. What makes this scam stand out is...
Cybercriminals are abusing Adobe Acrobat Sign, an online document signing service, to distribute info-stealing malware to unsuspecting users. The service...
Android malware 'FakeCalls' is circulating again in South Korea, imitating phone calls for over 20 financial organizations and attempting to...
The BianLian ransomware group has shifted its focus from encrypting its victims' files to only exfiltrating data found on compromised...
Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets used in mobile devices,...
A suspected Chinese hacking group has been linked to a series of attacks on government organizations exploiting a Fortinet zero-day...
Microsoft has released a script to make it easier to patch a BitLocker bypass security vulnerability in the Windows Recovery...
NAME__________Adobe Dimension code executionPlatforms Affected:Adobe Dimension 3.4.7Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Adobe Dimension could allow a remote attacker to execute arbitrary code...
NAME__________Adobe Dimension code executionPlatforms Affected:Adobe Dimension 3.4.7Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Adobe Dimension could allow a remote attacker to execute arbitrary code...