Jan 16, 2025Ravie LakshmananVulnerability / Cybersecurity
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism...
Jan 16, 2025The Hacker NewsCertificate Management / Compliance
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster...
Jan 16, 2025Ravie LakshmananVulnerability / Endpoint Security
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and...
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain...
Jan 15, 2025Ravie LakshmananCryptocurrency / Malware
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that...
Jan 15, 2025Ravie LakshmananMalvertising / Malware
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads...
Jan 15, 2025Ravie LakshmananBlockchain / Cryptocurrency
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes...
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn't just...