CISOs are making cybersecurity a business problem
U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to…
U.S. enterprises are responding to growing cybersecurity threats by working to make the best use of tools and services to ensure business resilience, according to…
Life sciences companies, including medical device manufacturers, biotech and pharmaceutical companies, are experiencing increasing rates of insider-driven data loss events, according to Code42. Faced with…
In-van delivery driver footage is reportedly finding its way to the internet. Are privacy issues at play, or is a valuable safety tool? Footage from…
We take a look at reports of a document being accidentally shared to the VirusTotal service and potentially exposing names and email addresses in the…
Researchers have uncovered a privilege escalation vulnerability in Google Cloud Build that could enable malicious actors tamper with application images and infect users. Researchers at…
GitHub is warning of a social engineering campaign targeting the accounts of developers in the blockchain, cryptocurrency, online gambling, and cybersecurity sectors to infect their…
The Metaverse refers to a virtual space or a collective virtual shared space, created by the convergence of various virtual reality (VR), augmented reality (AR),…
Researchers from the security company Eclypsium investigated the AMI firmware that was stolen in the 2021 ransomware attack. They discovered vulnerabilities that had been dormant…
China-linked group APT41 was spotted using two previously undocumented Android spyware called WyrmSpy and DragonEgg China-linked APT group APT41 has been observed using two previously…
AI services like ChatGPT, Google BARD, and Jasper are being abused to spread malware like BundleBot and Doenerium through Facebook. In a recent discovery by…
Jul 20, 2023The Hacker News If it seems like Remote Desktop Protocol (RDP) has been around forever, it’s because it has (at least compared to…
Jul 20, 2023THNCyber Attack / Supply Chain An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered evidence pointing to…