Jun 22, 2023Ravie LakshmananCyber Attack / Phishing A new phishing campaign codenamed MULTI#STORM has set its sights on India and the U.S. by ...
Category: Attack
Jun 22, 2023Ravie LakshmananSupply Chain / Software Security Millions of software repositories on GitHub are likely vulnerable to an attack ca...
Jun 22, 2023The Hacker News Losing sleep over Generative-AI apps? You're not alone or wrong. According to the Astrix Security Research Group, ...
Jun 22, 2023The Hacker NewsNetwork Security / Machine Learning Why Data Exfiltration Detection is Paramount? The world is witnessing an expone...
Jun 22, 2023Ravie LakshmananWebsite Security / WordPress A critical security flaw has been disclosed in the WordPress "Abandoned Cart Lite for...
Jun 22, 2023Ravie LakshmananVulnerability / Endpoint Security Apple on Wednesday released a slew of updates for iOS, iPadOS, macOS, watchOS, a...
Jun 21, 2023Ravie LakshmananCyber Threat / Privacy The North Korean threat actor known as ScarCruft has been observed using an information-ste...
Jun 21, 2023Ravie LakshmananAuthentication / Vulnerability A security shortcoming in Microsoft Azure Active Directory (AD) Open Authorization ...
Jun 21, 2023Ravie LakshmananMobile Security / Spyware More details have emerged about the spyware implant that's delivered to iOS devices as p...
Jun 21, 2023The Hacker NewsCybersecurity When we do quarterly planning, my team categorizes our goals within four evergreen outcomes: Reduce t...