Apr 09, 2024NewsroomBotnet / Vulnerability
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many...
Apr 08, 2024NewsroomSoftware Security / Cybersecurity
Google has announced support for what's called a V8 Sandbox in the Chrome web browser in an effort...
Apr 08, 2024NewsroomCybercrime / Network Security
Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing...
Apr 08, 2024NewsroomCybersecurity / Malvertising
A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows...
Apr 08, 2024NewsroomInvestment Scam / Mobile Security
Google has filed a lawsuit against two app developers for engaging in an "international online consumer investment...
Apr 06, 2024NewsroomSkimmer / Threat Intelligence
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce...
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to...
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the...