The Unknown Risks of The Software Supply Chain: A Deep-Dive
Jan 24, 2024The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source components as foundational blocks in their…
Jan 24, 2024The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source components as foundational blocks in their…
Splunk fixed high-severity flaw impacting Windows versions Pierluigi Paganini January 24, 2024 Splunk addressed multiple vulnerabilities in Splunk Enterprise, including a high-severity flaw impacting Windows…
RailTel Corporation of India Ltd., a prominent public sector enterprise providing broadband and VPN services, is allegedly facing a significant security threat. The announcement of…
Zloader, also known as Terdot, DELoader, or Silent Night, is a modular trojan that reappeared after nearly two years of absence but with significant enhancements to…
Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the vendor, partner, or supplier network.…
While a valuable tool in the cybersecurity toolkit, MFA is not immune to weaknesses. Read the “MFA Misconceptions” whitepaper to understand its limitations and how…
For financial gain, hackers exploit ransomware through which they encrypt victims’ data and then demand a ransom payment in exchange for its release. It shows…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has flown under the radar for…
Global Sanctions Imposed on Russian-Linked REVIL Ransomware Operator Governments of Australia, UK, and the United States have jointly sanctioned Alexander Gennadievich, a hacker associated with…
Jan 24, 2024NewsroomVulnerability / Endpoint Security A critical security flaw has been disclosed in Fortra’s GoAnywhere Managed File Transfer (MFT) software that could be abused…
The Hunters ransomware group has claimed to have launched a cyberattack on Double Eagle Energy Holdings IV, LLC, a prominent US-based oil and natural gas…
In the ever-evolving landscape of cybersecurity, organizations face a multitude of threats that can compromise their sensitive data and operations. While external threats from hackers…