No menu items!
No menu items!
More

    News

    Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide

    Aug 22, 2024Ravie LakshmananHardware Security / Supply Chain Attack Cybersecurity researchers have uncovered a hardware backdoor within a particular model of MIFARE Classic contactless...

    Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control

    Aug 22, 2024Ravie LakshmananNetwork Security / Zero-Day Details have emerged about a China-nexus threat group's exploitation of a recently disclosed, now-patched security flaw in...

    New ‘ALBeast’ Vulnerability Exposes Weakness in AWS Application Load Balancer

    Aug 22, 2024Ravie LakshmananCloud Security / Application Security As many as 15,000 applications using Amazon Web Services' (AWS) Application Load Balancer (ALB) for authentication...

    The Facts About Continuous Penetration Testing and Why It’s Important

    What is Continuous Attack Surface Penetration Testing or CASPT? Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is an advanced security practice...

    GitHub Patches Critical Security Flaw in Enterprise Server Granting Admin Privileges

    Aug 22, 2024Ravie LakshmananEnterprise Software / Vulnerability GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product,...

    Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access

    Aug 22, 2024Ravie LakshmananWebsite Security / Vulnerability Cybersecurity researchers have disclosed a critical security flaw in the LiteSpeed Cache plugin for WordPress that could...

    Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

    Aug 22, 2024Ravie LakshmananBrowser Security / Vulnerability Google has rolled out security fixes to address a high-severity security flaw in its Chrome browser that...

    New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining

    Aug 22, 2024Ravie LakshmananDatabase Security / Cryptocurrency Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that's designed to mine cryptocurrency after brute-forcing...

    North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign

    Aug 21, 2024Ravie LakshmananCyber Espionage / Malware A new remote access trojan called MoonPeak has been discovered as being used by a state-sponsored North...

    Latest articles

    spot_imgspot_img