No menu items!
No menu items!
More

    News

    New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits

    Jan 16, 2025Ravie LakshmananVulnerability / Cybersecurity Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism...

    Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action

    Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster...

    The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

    You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in...

    Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

    Jan 16, 2025Ravie LakshmananVulnerability / Endpoint Security Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and...

    Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

    Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain...

    Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

    Jan 15, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that...

    Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

    Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads...

    North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains

    Jan 15, 2025Ravie LakshmananBlockchain / Cryptocurrency Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes...

    The High-Stakes Disconnect For ICS/OT Security

    Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn't just...

    Latest articles

    spot_imgspot_img