No menu items!
No menu items!
More

    News

    How to Find and Fix Risky Sharing in Google Drive

    Mar 06, 2024The Hacker NewsData Security / Cloud Security Every Google Workspace administrator knows how quickly Google Drive becomes a messy sprawl of loosely...

    VMware Issues Security Patches for ESXi, Workstation, and Fusion Flaws

    Mar 06, 2024NewsroomSoftware Security / Vulnerability VMware has released patches to address four security flaws impacting ESXi, Workstation, and Fusion, including two critical flaws...

    U.S. Cracks Down on Predatory Spyware Firm for Targeting Officials and Journalists

    Mar 06, 2024NewsroomPrivacy / Spyware The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) sanctioned two individuals and five entities associated with...

    Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws

    Mar 06, 2024NewsroomVulnerability / Zero Day Apple has released security updates to address several security flaws, including two vulnerabilities that it said have...

    Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware

    Mar 05, 2024NewsroomMalware / Cyber Threat North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new...

    Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

    Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with...

    Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

    Mar 05, 2024NewsroomMalware / Artificial Intelligence More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between...

    Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams

    Mar 05, 2024NewsroomCybercrime / Malware A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets into fake investment platforms...

    What is Exposure Management and How Does it Differ from ASM?

    Mar 05, 2024NewsroomAttack Surface / Exposure Management Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the...

    Latest articles

    spot_imgspot_img