RSS

How to make your web apps resistant to social engineering

There are things that you can do to make your web apps more resistant to social ...

UnitedHealth: Change Healthcare cyberattack caused $872...

UnitedHealth Group reported an $872 million impact on its Q1 earnings due to the...

PuTTY SSH client flaw allows recovery of cryptographic ...

A vulnerability tracked as CVE-2024-31497 in PuTTY 0.68 through 0.80 could poten...

Cisco warns of large-scale brute-force attacks against ...

Cisco warns about a large-scale credential brute-forcing campaign targeting VPN ...

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs ...

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercrimina...

Crypto miner arrested for skipping on $3.5 million in c...

The U.S. Department of Justice has announced the arrest and indictment of Charle...

Microsoft will limit Exchange Online bulk emails to fig...

Microsoft has announced plans to fight spam by imposing a daily Exchange Online ...

New SteganoAmor attacks use steganography to target 320...

A new campaign conducted by the TA558 hacking group is concealing malicious code...

Ransomware gang starts leaking alleged stolen Change He...

The RansomHub extortion gang has begun leaking what they claim is corporate and ...

Muddled Libra Shifts Focus to SaaS and Cloud for Extort...

The threat actor known as Muddled Libra has been observed actively targeting sof...

AI Copilot: Launching Innovation Rockets, But Beware of...

Imagine a world where the software that powers your favorite apps, secures your ...

Palo Alto Networks Releases Urgent Fixes for Exploited ...

Palo Alto Networks has released hotfixes to address a maximum-severity security ...

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server...

A security flaw impacting the Lighttpd web server used in baseboard management c...

Chinese-Linked LightSpy iOS Spyware Targets South Asian...

Cybersecurity researchers have discovered a "renewed" cyber espionage campaign t...

Timing is Everything: The Role of Just-in-Time Privileg...

To minimize the risk of privilege misuse, a trend in the privileged access manag...

This Startup Aims To Simplify End-to-End Cybersecurity,...

The Web3 movement is going from strength to strength with every day that passes....