WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
Dec 08, 2023NewsroomVulnerability / Website Security WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat…
Dec 08, 2023NewsroomVulnerability / Website Security WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat…
Generative AI came to the fore in 2023 and much has been learned about how effective it can be in the enterprise – so, what…
The notorious Akira ransomware group has claimed two more victims, adding them to its list of Akira ransomware attacks. The claims were posted on a…
Atlanta-based Cyble Inc., a trailblazing AI-powered threat intelligence platform, has reached a remarkable milestone by earning recognition among the distinguished Top Security Startups of 2023…
In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking unit, has pivoted its focus to cryptocurrency projects, employing intricate…
The Hellenic Post, Greece’s national postal company, has allegedly fallen victim to a cyber attack orchestrated by the notorious Anonymous Collection hacker group. The group…
There were reports of several Android loan apps that pretended to be providing loan services and easy access to funds, which were found to be…
As technology keeps leaping forward, cyber threats are getting sneakier. In the face of advancing cyber threats, staying ahead of the curve requires an army…
The United Kingdom and its allies have revealed that the Russian intelligence services had attempted to use cyberattacks to target prominent persons and organizations in…
The Citizens Bank of West Virginia has reportedly fallen victim to a cyberattack orchestrated by the notorious LockBit ransomware group. The group has left its…
By Eric George, Director of Solutions Engineering, Fortra Researchers at Fortra have observed cybercriminals abusing New Top-Level Domain .zip in two separate phishing campaigns targeting…
Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets. Outlook vulnerabilities offer:- Access to sensitive emails Access to sensitive…