Aug 06, 2024Ravie LakshmananMobile Security / Vulnerability
Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited...
Aug 06, 2024Ravie LakshmananEnterprise Security / Vulnerability A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source...
Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers...
Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability
Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable...
Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy
The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years...
Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection,...
Aug 05, 2024Ravie LakshmananBrowser Security / Windows Security
The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to...
Aug 05, 2024Ravie LakshmananNetwork Security / Vulnerability
A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be...
Aug 05, 2024Ravie LakshmananMobile Security / Financial Security
Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an...