In order to address a high-severity security weakness in its Secure Client software that could allow a threat actor to start a VPN session with the ta...
Read MoreOne-day security vulnerabilities are being quickly adopted by Magnet Goblin, a financially driven threat actor, into its toolkit to opportunistically...
Read MorePopular News
The Massachusetts Institute of Technology (MITRE) releases the Aircraft Risk Identification & Assessment (ARIA) software to improve aircraft safet...
Read MoreMicrosoft disclosed on Friday that after a hack that surfaced in January 2024, the threat actor known as Midnight Blizzard—also known as APT29 o...
Read MoreA 38-year-old Chinese national and California resident has been charged by the U.S. Department of Justice (DoJ) for allegedly stealing confidential Go...
Read MoreAs part of an evolving malware campaign, threat actors are focusing on misconfigured and insecure servers running Redis, Docker, Atlassian Confluence,...
Read MoreSince December 2023, threat actors have been using fictitious websites that promote well-known video conferencing apps like Zoom, Skype, and Google Me...
Read More Customers of American Express are being notified that their data was exposed in a third-party services provider's data breach.
The company noti...
Threat actors from North Korea have been using the recently discovered security holes in ConnectWise ScreenConnect to spread a brand-new piece of malw...
Read MoreTo fix several security issues, including two that it claimed have been actively exploited in the wild, Apple has published security updates. These ar...
Read MoreMeta owns Facebook, Instagram, and Threads; all three are currently having technical issues. Numerous customers throughout the world have been impacte...
Read MoreTwo fresh security flaws in JetBrains TeamCity On-Premises software have surfaced, which a hostile actor might use to get access to compromised comput...
Read MoreAn intelligence revelation by the South on Monday said that a hack by North Korea had successfully entered a critical industry and removed data that c...
Read MoreCybercriminals are utilizing an Android-based application to manage a vast money laundering scam through a network of hired money mules in India. Acco...
Read More