Jan 22, 2024NewsroomBrowser Security / Cyber Threat
Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate...
Jan 22, 2024NewsroomVulnerability / Malware
Cybersecurity researchers are warning of a "notable increase" in threat actor activity actively exploiting a now-patched flaw in Apache...
Jan 17, 2024NewsroomBrowser Security / Vulnerability
Google on Tuesday released updates to fix four security issues in its Chrome browser, including an actively exploited...
Jan 17, 2024NewsroomVulnerability / Cyber Threat
Citrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly...
Jan 17, 2024NewsroomVulnerability / Software Security
GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be...
Jan 17, 2024NewsroomSpyware / Forensic Analysis
Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS...
Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar
In the digital age, the battleground for security professionals is not only evolving, it's expanding...
Jan 17, 2024NewsroomFinancial Data / Vulnerability
The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be...