î ‚Jul 02, 2024î „NewsroomHardware Security / Vulnerability Modern CPUs from Intel, including Raptor Lake and Alder Lake, have been found vulnerable...
Category: Attack
The cybersecurity threat landscape has witnessed a dramatic and alarming rise in the average ransomware payment, an increase exceeding 500%. Sop...
î ‚Jul 02, 2024î „NewsroomCyber Espionage / Vulnerability A China-nexus cyber espionage group named Velvet Ant has been observed exploiting a zero-d...
î ‚Jul 02, 2024î „NewsroomDigital Regulation / Tech News Meta's decision to offer an ad-free subscription in the European Union (E.U.) has faced a n...
î ‚Jul 02, 2024î „NewsroomData Theft / Wi-Fi Security An Australian man has been charged with running a fake Wi-Fi access point during a domestic fl...
î ‚Jul 01, 2024î „NewsroomSupply Chain / Software Security A trio of security flaws has been uncovered in the CocoaPods dependency manager for Swift...
î ‚Jul 01, 2024î „NewsroomSupply Chain Attack / Threat Intelligence Installers for three different software products developed by an Indian company ...
î ‚Jul 01, 2024î „NewsroomMobile Security / Spyware The threat actor known as Transparent Tribe has continued to unleash malware-laced Android apps ...
î ‚Jul 01, 2024î „NewsroomLinux / Vulnerability OpenSSH maintainers have released security updates to contain a critical security flaw that could re...
At the heart of every application are secrets. Credentials that allow human-to-machine and machine-to-machine communication. Machine identities ...
