Aug 11, 2023THNMalware / Cyber Attack The Chinese threat actor known as APT31 (aka Bronze Vinewood, Judgement Panda, or Violet Typhoon) has be...
Author: admin
Aug 11, 2023THNMalware / Cyber Threat An unknown threat actor has been linked to a cyber attack on a power generation company in southern Afri...
Aug 11, 2023THNOperational Technology / Vulnerability A set of 15 high-severity security flaws have been disclosed in the CODESYS V3 software ...
Aug 11, 2023THNEndpoint Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched...
Fraud Management & Cybercrime , Social Engineering Phishing Kit Primarily Used in Attacks Against Employees of Fortune 500 Companies Prajeet...
Fraud Management & Cybercrime , Social Engineering Phishing Kit Primarily Used in Attacks Against Employees of Fortune 500 Companies Prajeet...
Endpoint Security , Hardware / Chip-level Security Vulnerability Allows Manipulation of CPU to Leak Data Akshaya Asokan (asokan_akshaya) • Augus...
This photo illustration shows an image of former President Donald Trump next to a phone screen that is displaying the Truth Social app, in Washin...
3rd Party Risk Management , Governance & Risk Management , Standards, Regulations & Compliance Also: Lessons Learned From the MOVEit Bre...
The Tesla Motors Inc. Model X sport utility vehicle (SUV).David Paul Morris | Bloomberg | Getty ImagesA Tesla Model X totaled in the U.S. late la...