Cyber Security
A security vulnerability in a mobile device management software could allow attackers access to organizations’ internal and cloud networks, researchers warn. Discovered by Assetnote,...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A security vulnerability in a mobile device management software could allow attackers access to organizations’ internal and cloud networks, researchers warn. Discovered by Assetnote,...
The Open Source Security Foundation (OpenSSF), a Linux Foundation-backed initiative has released its first prototype version of the ‘Package Analysis’ tool that aims to...
Security analysts have uncovered a recent phishing campaign from Russian hackers known as APT29 (Cozy Bear or Nobelium) targeting diplomats and government entities. The APT29...
Fake Windows 10 updates are being used to distribute the Magniber ransomware in a massive campaign that started earlier this month. Over the past...
ARcare, a US healthcare provider with facilities in Arkansas, Kentucky, and Mississippi, has admitted a data breach potentially affecting 345,000 individuals. “On February 24, 2022, ARcare...
GitHub has revealed details of a security breach that has allowed an unknown attacker to download data from dozens of private code repositories. The attacker authenticated...
A new report from Microsoft has revealed that at least six separate Russian nation-state actors have launched damaging cyber-attacks against Ukraine since the invasion...
A group of software package maintainers have created a tool for defending applications that depend on open source JavaScript libraries. Called Socket, the tool...
FILE – People crowd under a destroyed bridge as they try to flee, crossing the Irpin river on the outskirts of Kyiv, Ukraine, Tuesday,...
Doubts have arisen about the veracity of research that purportedly demonstrates a serious vulnerability involving VirusTotal, a Google-owned antivirus comparison and threat intel service. VirusTotal (VT) offers...
Recent Comments