No menu items!
No menu items!
More

    News

    Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

    Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike in the "frequency and...

    Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

    Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old...

    Bogus npm Packages Used to Trick Software Developers into Installing Malware

    Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a...

    Severe Flaws Disclosed in Brocade SANnav SAN Management Software

    Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited...

    Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

    Apr 26, 2024NewsroomNetwork Security / Zero Day Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that...

    New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates

    Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical...

    10 Critical Endpoint Security Tips You Should Know

    In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business's digital kingdom. And because of this,...

    Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

    Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress...

    North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

    Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a...

    Latest articles

    spot_imgspot_img