SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks
Sep 17, 2024Ravie LakshmananSoftware Security / Data Protection
SolarWinds has released fixes to address two security flaws in its Access Rights Manager (ARM) software,...
Master Your PCI DSS v4 Compliance with Innovative Smart Approvals
Sep 16, 2024The Hacker NewsPayment Security / Data Protection
The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger,...
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
Sep 16, 2024Ravie LakshmananFinancial Security / Malware
Cybersecurity researchers are continuing to warn about North Korean threat actors' attempts to target prospective victims on...
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
Sep 16, 2024Ravie LakshmananCloud Security / Vulnerability
A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve...
Designing an Identity-Focused Incident Response Playbook
Sep 16, 2024The Hacker NewsIdentity Protection / Incident Response
Imagine this... You arrive at work to a chaotic scene. Systems are down, panic is...
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
Sep 16, 2024Ravie LakshmananSpyware / Threat Intelligence
Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing...
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are...
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Sep 14, 2024Ravie LakshmananEnterprise Security / Threat Intelligence
Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has...
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Sep 13, 2024Ravie LakshmananSoftware Security / Threat Intelligence
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in...
Latest articles