No menu items!
No menu items!
More

    News

    Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk

    Jul 26, 2024NewsroomSoftware Security / Vulnerability Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical...

    Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Jul 25, 2024NewsroomCloud Security / Vulnerability Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform's Cloud Functions service that an attacker...

    North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

    Jul 25, 2024NewsroomMalware / Cyber Espionage A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that...

    What Enterprises MUST Know about Enterprise Browser Security

    Jul 25, 2024The Hacker NewsBrowser Security / Enterprise Security The browser is the nerve center of the modern workspace. Ironically, however, the browser is...

    Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

    Jul 25, 2024NewsroomCybercrime / Online Safety Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were...

    6 Types of Applications Security Testing You Must Know About

    While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for...

    New Chrome Feature Scans Password-Protected Files for Malicious Content

    Jul 25, 2024NewsroomBrowser Security / Data Protection Google said it's adding new security warnings when downloading potentially suspicious and malicious files via its Chrome...

    CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software

    Jul 25, 2024NewsroomDNS Security /Vulnerability The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain...

    Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins

    Jul 25, 2024NewsroomContainer Security / Vulnerability Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker...

    Latest articles

    spot_imgspot_img