î Mar 22, 2024î NewsroomAmazon Web Services / Vulnerability Cybersecurity researchers have shared details of a now-patched security vulnerability ...
Category: Attack
î Mar 22, 2024î NewsroomCyber Defense / Vulnerability A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 B...
The ThreatLockerÂź Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organ...
î Mar 22, 2024î NewsroomPrivacy / Encryption The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Th...
î Mar 22, 2024î NewsroomLinux / Cyber Warfare The data wiping malware called AcidPour may have been deployed in attacks targeting four telecom pro...
î Mar 21, 2024î NewsroomThreat Intelligence / Malware The Russia-linked threat actor known as Turla infected several systems belonging to an unnam...
î Mar 21, 2024î NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which have discrepancies...
î Mar 21, 2024î NewsroomThreat Intelligence / Vulnerability Cybersecurity researchers have shed light on a tool referred to as AndroxGh0st that's ...
î Mar 21, 2024î NewsroomMachine Learning / Software Security GitHub on Wednesday announced that it's making available a feature called code scanni...
In today's digital-first business environment dominated by SaaS applications, organizations increasingly depend on third-party vendors for essen...