How Cyberattacks Are Transforming Warfare
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in...
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in...
A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in...
Adobe's Patch Tuesday update for September 2023 comes with a patch for a critical actively exploited security flaw in Acrobat...
Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability in Firefox and Thunderbird that has been actively...
Apple released security updates for older iPhones to fix a zero-day vulnerability tracked as CVE-2023-41064 that was actively exploited to...
Cybersecurity has become a core priority in the business world and, as Internet of Things (IoT) devices proliferate, home network...
A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing...
An espionage threat group tracked as 'Redfly' hacked a national electricity grid organization in Asia and quietly maintained access to...
Image: Midjourney Microsoft says an initial access broker known for working with ransomware groups has recently switched to Microsoft Teams...
Mozilla released emergency security updates today to fix a critical zero-day vulnerability exploited in the wild, impacting its Firefox web...
A new information stealer malware named 'MetaStealer' has appeared in the wild, stealing a wide variety of sensitive information from...
Adobe has released security updates to patch a zero-day vulnerability in Acrobat and Reader tagged as exploited in attacks. Even...
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has announced it is offering free security scans for critical infrastructure facilities,...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
Google on Monday rolled out out-of-band security patches to address a critical security flaw in its Chrome web browser that...
A sophisticated phishing campaign is using a Microsoft Word document lure to distribute a trifecta of threats, namely Agent Tesla,...
A threat actor called Redfly has been linked to a compromise of a national grid located in an unnamed Asian...
A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing...
SaaS applications are the backbone of modern businesses, constituting a staggering 70% of total software usage. Applications like Box, Google...
A new vulnerability disclosed in GitHub could have exposed thousands of repositories at risk of repojacking attacks, new findings show....
Microsoft Releases September 2023 Updates Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A cyber threat actor...
Cisco Releases Security Advisories for Multiple Products Cisco has released security advisories to address vulnerabilities affecting multiple Cisco products. A...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on September 12, 2023. These...
CISA Adds Two Known Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...