Feb 14, 2024NewsroomSoftware Security / Vulnerability
Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to...
Feb 14, 2024NewsroomMalware / Cybercrime
The infamous malware loader and initial access broker known as Bumblebee has resurfaced after a four-month absence as part...
The landscape of cybersecurity in financial services is undergoing a rapid transformation. Cybercriminals are exploiting advanced technologies and methodologies, making traditional security...
Feb 14, 2024NewsroomZero-Day / Financial Sector Security
A newly disclosed security flaw in the Microsoft Defender SmartScreen has been exploited as a zero-day by...
Feb 14, 2024NewsroomPatch Tuesday / Vulnerability
Microsoft has released patches to address 73 security flaws spanning its software lineup as part of its Patch...
Feb 13, 2024NewsroomCyber Threat / Malware
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been...
Feb 13, 2024NewsroomCryptocurrency / Rootkit
The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding...
Feb 13, 2024The Hacker NewsSaaS Security / Data Breach
The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in major...