Feb 28, 2024NewsroomFirmware Security / Vulnerability
In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other countries are urging users...
Feb 27, 2024NewsroomSupply Chain Attack / Data Security
Cybersecurity researchers have found that it's possible to compromise the Hugging Face Safetensors conversion service to...
Feb 27, 2024NewsroomVulnerability / Website Security
A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable unauthenticated users...
Feb 27, 2024The Hacker NewsMalware / Network Security
An "intricately designed" remote access trojan (RAT) called Xeno RAT has been made available on GitHub,...
Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional's role. Threat intelligence platforms can significantly enhance their...
Feb 27, 2024NewsroomCloud Security / Threat Intelligence
Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving...
Feb 27, 2024NewsroomWebsite Security / Cryptojacking
A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more...
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking...
Feb 26, 2024The Hacker NewsSteganography / Malware
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial...