î ‚May 24, 2024î „NewsroomVulnerability / Browser Security Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrom...
Category: Attack
î ‚May 24, 2024î „NewsroomMalvertising / Endpoint Security Threat actors have been observed making use of fake websites masquerading as legitimate a...
î ‚May 24, 2024î „The Hacker NewsCybersecurity Webinar Don't be fooled into thinking that cyber threats are only a problem for large organizations. ...
Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they w...
î ‚May 24, 2024î „NewsroomSupply Chain Attack / Malware Malicious actors have backdoored the installer associated with courtroom video recording sof...
î ‚May 15, 2024î „NewsroomPatch Tuesday / Vulnerability Microsoft has addressed a total of 61 new security flaws in its software as part of its Patc...
î ‚May 15, 2024î „NewsroomCryptocurrency / Anonymity A Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash cr...
î ‚May 15, 2024î „The Hacker NewsEnterprise Security / Cloud Computing While cloud adoption has been top of mind for many IT professionals for nearl...
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than 100,000 were still compr...
Here's How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding...
