Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection...
Mar 20, 2025Ravie LakshmananCybercrime / Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense...
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access...
Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has...
Mar 19, 2025Ravie LakshmananCloud Security / Web Security
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as...
Mar 19, 2025The Hacker NewsIdentity Security / Webinar
In today's digital world, security breaches are all too common. Despite the many security tools and...
Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication...
Mar 19, 2025Ravie LakshmananVulnerability / Network Security
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data...
Mar 19, 2025Ravie LakshmananVulnerability / DevSecOps
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain...