New Chrome Feature Scans Password-Protected Files for Malicious Content
Jul 25, 2024NewsroomBrowser Security / Data Protection
Google said it's adding new security warnings when downloading potentially suspicious and malicious files via its Chrome...
CISA Warns of Exploitable Vulnerabilities in Popular BIND 9 DNS Software
Jul 25, 2024NewsroomDNS Security /Vulnerability
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain...
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
Jul 25, 2024NewsroomContainer Security / Vulnerability
Docker is warning of a critical flaw impacting certain versions of Docker Engine that could allow an attacker...
Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool
Jul 24, 2024NewsroomCyber Espionage / Threat Intelligence
The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties...
Telegram App Flaw Exploited to Spread Malware Hidden in Videos
A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking...
How a Trust Center Solves Your Security Questionnaire Problem
Security questionnaires aren't just an inconvenience — they're a recurring problem for security and sales teams.
They bleed time from organizations, filling the schedules...
How to Reduce SaaS Spend and Risk Without Impacting Productivity
Jul 24, 2024The Hacker NewsSaaS Management / IT Governance
There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have...
CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices
Jul 24, 2024NewsroomSoftware Update / IT Outage
Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows...
CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List
Jul 24, 2024NewsroomVulnerability / Software Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities...
Latest articles