î ‚Oct 26, 2023î „NewsroomVulnerability / Network Security Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare,...
Category: Attack
î ‚Oct 26, 2023î „NewsroomCyber Threat / Malware The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole ...
î ‚Oct 25, 2023î „Newsroom Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online services s...
î ‚Oct 25, 2023î „NewsroomThreat Intelligence / Vulnerability The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw i...
î ‚Oct 25, 2023î „The Hacker NewsRansomware/ Malware Threat In today's digital landscape, around 60% of corporate data now resides in the cloud, wit...
î ‚Oct 25, 2023î „NewsroomVulnerability / Cyber Threat VMware has released security updates to address a critical flaw in the vCenter Server that co...
The popularity of Brazil's PIX instant payment system has made it a lucrative target for threat actors looking to generate illicit profits using...
î ‚Oct 25, 2023î „NewsroomExploit / Vulnerability Virtualization services provider VMware has alerted customers to the existence of a proof-of-conce...
î ‚Oct 24, 2023î „NewsroomCyber Espionage / Data Safety A former employee of the U.S. National Security Agency (NSA) has pleaded guilty to charges a...
While application development has evolved rapidly, the API management suites used to access these services remain a spooky reminder of a differe...
