No menu items!
No menu items!
More

    News

    Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

    Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw...

    Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets

    Mar 09, 2024NewsroomCyber Attack / Threat Intelligence Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy...

    Meta Details WhatsApp and Messenger Interoperability to Comply with EU’s DMA Regulations

    Mar 08, 2024NewsroomInteroperability / Encryption Meta has offered details on how it intends to implement interoperability in WhatsApp and Messenger with third-party messaging services...

    QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

    Mar 08, 2024NewsroomEndpoint Security / Network Security Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber...

    Secrets Sensei: Conquering Secrets Management Challenges

    Mar 08, 2024The Hacker NewsSecrets Management / Access Control In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets...

    Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

    Mar 08, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be...

    CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

    Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity...

    Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

    Mar 07, 2024NewsroomCyber Espionage / Software Security The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting...

    Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

    Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri...

    Latest articles

    spot_imgspot_img