Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has...
Mar 19, 2025Ravie LakshmananCloud Security / Web Security
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as...
Mar 19, 2025The Hacker NewsIdentity Security / Webinar
In today's digital world, security breaches are all too common. Despite the many security tools and...
Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication...
Mar 19, 2025Ravie LakshmananVulnerability / Network Security
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data...
Mar 19, 2025Ravie LakshmananVulnerability / DevSecOps
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain...
Mar 18, 2025Ravie LakshmananVulnerability / Firmware Security
A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could...
Mar 18, 2025Ravie LakshmananCloud Security / Enterprise Security
Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz...