Apr 17, 2024NewsroomVulnerability / Web Application Firewall
Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient...
Apr 17, 2024NewsroomEncryption / Vulnerability
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware.
The attacks leverage...
Apr 17, 2024NewsroomIoT Security / Network Security
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network...
Apr 16, 2024NewsroomCloud Security / DevSecOps
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud...
Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver...
Apr 16, 2024NewsroomSupply Chain / Software Security
Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokes...
Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats....
Apr 16, 2024NewsroomEncryption / Network Security
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability...