No menu items!
No menu items!
More

    News

    China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

    Mar 22, 2024NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware...

    Implementing Zero Trust Controls for Compliance

    The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls...

    U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

    Mar 22, 2024NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple...

    Russian Hackers Target Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware

    Mar 22, 2024NewsroomLinux / Cyber Warfare The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom providers in Ukraine,...

    Russia Hackers Using TinyTurla-NG to Breach European NGO’s Systems

    Mar 21, 2024NewsroomThreat Intelligence / Malware The Russia-linked threat actor known as Turla infected several systems belonging to an unnamed European non-governmental organization (NGO)...

    Over 800 npm Packages Found with Discrepancies, 18 Exploitable to ‘Manifest Confusion’

    Mar 21, 2024NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which have discrepancies from their registry...

    AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials

    Mar 21, 2024NewsroomThreat Intelligence / Vulnerability Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's used to target Laravel applications...

    GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws

    Mar 21, 2024NewsroomMachine Learning / Software Security GitHub on Wednesday announced that it's making available a feature called code scanning autofix in public beta...

    How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl

    In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essential cloud services and software solutions....

    Latest articles

    spot_imgspot_img