î ‚Mar 05, 2024î „NewsroomVulnerability / Network Security A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premi...
Category: Attack
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering sc...
î ‚Mar 04, 2024î „The Hacker NewsSaaS Security / Vulnerability Assessment A company's lifecycle stage, size, and state have a significant impact on ...
î ‚Mar 04, 2024î „NewsroomAI Security / Vulnerability As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been d...
U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities,...
î ‚Mar 02, 2024î „NewsroomSpyware / Privacy A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other products to Meta a...
î ‚Mar 02, 2024î „NewsroomCybercrime / Social Engineering The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian n...
î ‚Mar 01, 2024î „NewsroomPhishing Kit / Cryptocurrency A novel phishing kit has been observed impersonating the login pages of well-known cryptocur...
î ‚Mar 01, 2024î „NewsroomLinux / Cyber Threat Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) called ...
More than a decade ago, the concept of the 'blameless' postmortem changed how tech companies recognize failures at scale. John Allspaw, who coin...
