Popular password management service LastPass said it’s investigating a second security incident that involved attackers accessing some of its customer information. “We...
The French data protection watchdog on Tuesday fined electricity provider Électricité de France (EDF) €600,000 for violating the European Union General Data...
The Australian government has passed a bill that markedly increases the penalty for companies suffering from serious or repeated data breaches. To...
Over 70,000 individuals are receiving text messages from the police informing them that they have been victims of online banking frauds and...
Oracle Access Manager (OAM) contains a pre-authentication RCE vulnerability (CVE-2021-35587) that was fixed in January 2022. However, the vulnerability is still being...
The security researchers at ESET found a new high-risk vulnerability in the UEFI firmware of Acer computers. Because to a security flaw...
Acer has released a firmware update to address a security vulnerability that could be potentially weaponized to turn off UEFI Secure Boot...
Threat actors are capitalizing on a popular TikTok challenge to trick users into downloading information-stealing malware, according to new research from Checkmarx....
Ireland’s Data Protection Commission (DPC) has levied fines of €265 million ($277 million) against Meta Platforms for failing to safeguard the personal...
Earlier we published an article that provided details of a data breach that occurred on Twitter and affected 5.4 million accounts. Now, the...
A gang of hackers has been responsible for the hacking of WhatsApp in recent days, which resulted in the disclosure of a...
Amazon Web Services (AWS) has resolved a cross-tenant vulnerability in its platform that could be weaponized by an attacker to gain unauthorized...
For 6 months, the infamous Emotet botnet has shown almost no activity, and now it’s distributing malicious spam. Let’s dive into details...
Google sent out emergency patches for its Chrome web browser on Thursday to fix a security hole that the company says is...
Iranian hackers broke into a key Israeli security organization on Wednesday, stole surveillance tape that caught one of the twin explosions that...
There has recently been a discovery made by IBM Security X-Force Threat Researchers regarding a new variant of ransomware known as RansomExx...
'Tis the season for shopping and if you too are scouting for bargains, make sure to keep your money safe when snapping...
Recent data breaches have driven fast reforms to Australia’s cybersecurity and data protection rules, and the most recent development looks to be...
Docker is a technology for containerization, while Kubernetes is a tool for orchestrating container deployments. In the subsequent subsections, we will discuss...
The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language,...
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Practical Guidance For Securing Your Software Supply Chain
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
New Attack Technique Exploits Microsoft Management Console Files
How to Cut Costs with a Browser Security Platform
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations