Mar 22, 2024NewsroomAmazon Web Services / Vulnerability
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows...
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer.
The campaigns...
Mar 22, 2024NewsroomWeb Security / Vulnerability
A massive malware campaign dubbed Sign1 has compromised over 39,000 WordPress sites in the last six months, using...
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls...
Mar 22, 2024NewsroomPrivacy / Encryption
The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple...
Mar 22, 2024NewsroomLinux / Cyber Warfare
The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine,...
Mar 21, 2024NewsroomThreat Intelligence / Malware
The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO)...
Mar 21, 2024NewsroomSoftware Security / Open Source
New research has discovered over 800 packages in the npm registry which have discrepancies from their registry...