No menu items!
No menu items!
More

    News

    Telegram App Flaw Exploited to Spread Malware Hidden in Videos

    A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking...

    How a Trust Center Solves Your Security Questionnaire Problem

    Security questionnaires aren't just an inconvenience — they're a recurring problem for security and sales teams. They bleed time from organizations, filling the schedules...

    How to Reduce SaaS Spend and Risk Without Impacting Productivity

    Jul 24, 2024The Hacker NewsSaaS Management / IT Governance There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have...

    CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

    Jul 24, 2024NewsroomSoftware Update / IT Outage Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows...

    CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

    Jul 24, 2024NewsroomVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities...

    Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers

    Jul 24, 2024NewsroomMalvertising / Threat Intelligence A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign...

    Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware

    Jul 23, 2024NewsroomCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research...

    Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model

    Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its "pay or consent"...

    Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

    Jul 23, 2024NewsroomThreat Detection / Website Security Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card...

    Latest articles

    spot_imgspot_img