Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats....
Apr 16, 2024NewsroomEncryption / Network Security
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability...
Apr 16, 2024NewsroomPrivacy Breach / Regulatory Compliance
The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company Cerebral from using or disclosing...
Apr 15, 2024NewsroomFirmware Security / Vulnerability
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by...
Apr 15, 2024NewsroomCloud Security /SaaS Security
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service...
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted...
Apr 15, 2024The Hacker NewsActive Directory / Attack Surface
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM)...
Apr 15, 2024NewsroomFirewall Security / Vulnerability
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come...