Home

Critical Tinyproxy Flaw Opens Over 50,000 Hosts to...

More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that's vulnerable to a critical unp...

China-Linked Hackers Suspected in ArcaneDoor Cyber...

The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may hav...

It Costs How Much?!? The Financial Pitfalls of Cyb...

Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a sma...

Xiaomi Android Devices Hit by Multiple Flaws Acros...

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running ...

New 'Cuckoo' Persistent macOS Spyware Targeting In...

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persis...

Microsoft Outlook Flaw Exploited by Russia's APT28...

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-l...

Expert-Led Webinar - Uncovering Latest DDoS Tactic...

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant t...

Hackers Increasingly Abusing Microsoft Graph API f...

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. Thi...

New Guide Explains How to Eliminate the Risk of Sh...

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of tech...

NSA, FBI Alert on N. Korean Hackers Spoofing Email...

The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to send ema...

Google Announces Passkeys Adopted by Over 400 Mill...

Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 bi...

Four Critical Vulnerabilities Expose HPE Aruba Dev...

HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that coul...

Popular Android Apps Like Xiaomi, WPS Office Vulne...

Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability c...

Ukrainian REvil Hacker Sentenced to 13 Years and O...

A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16 million in restitution for carrying...

When is One Vulnerability Scanner Not Enough?

Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to...

Dropbox Discloses Breach of Digital Signature Serv...

Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified...

New "Goldoon" Botnet Targets D-Link Routers With D...

A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security fl...

CISA Warns of Active Exploitation of Severe GitLab...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited...

New Cuttlefish Malware Hijacks Router Connections,...

A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring al...

Bitcoin Forensic Analysis Uncovers Money Launderin...

A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with ill...