Jun 03, 2024NewsroomSoftware Security / Supply Chain
Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to...
Jun 03, 2024NewsroomEndpoint Security / Vulnerability
Now-patched authorization bypass issues impacting Cox modems that could have been abused as a starting point to gain...
Jun 03, 2024NewsroomMalware / Cyber Attack
The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora...
Jun 01, 2024NewsroomAI-as-a-Service / Data Breach
Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform...
May 31, 2024NewsroomNetwork Security / Cyber Attack
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline...
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late...
May 31, 2024NewsroomThreat Detection / Endpoint Security
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across...