No menu items!
No menu items!
More

    THN

    Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

    Apr 17, 2025Ravie LakshmananVulnerability / Network Security A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could...

    CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

    Apr 17, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure...

    Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

    Apr 17, 2025Ravie LakshmananZero-Day / Vulnerability Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two security...

    Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

    Apr 16, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service...

    The New Cyber Risks Facing Supply Chains

    Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand their reliance on third-party...

    Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024

    Apr 16, 2025Ravie LakshmananArtificial Intelligence / Malvertising Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority...

    Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins

    Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to direct unsuspecting users to spoofed Microsoft...

    A Look Inside Wing Security’s Layered SaaS Identity Defense

    Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every...

    New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

    Apr 16, 2025Ravie LakshmananCyber Espionage / Network Security Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as...

    Latest articles

    spot_imgspot_img