Welcome to the Laser Wars
The age of the laser weapon is finally upon us. The United States Army has officially sent a pair of high-energy laser weapons overseas to…
The age of the laser weapon is finally upon us. The United States Army has officially sent a pair of high-energy laser weapons overseas to…
Many businesses use enterprise resource planning (ERP) systems like Apache OFBiz. However, it has been found to have significant security holes that let attackers run…
Hacktivist collective R00TK1T ISC CyberTeam has claimed responsibility for breaching the Ministry of Supply and Internal Trade in Egypt. The group’s announcement, posted on their…
An unidentified threat actor known as “pwns3c” has offered access to a database purported to contain sensitive data and documents from a City of New…
Australian Firstmac Limited disclosed a data breach after cyber attack Pierluigi Paganini May 13, 2024 Firstmac Limited disclosed a data breach after the new Embargo extortion…
A major mistake in setup caused Google Cloud and UniSuper to delete the financial service provider’s private cloud account. This event has caused a lot…
A major cybersecurity breach happened at the Ohio Lottery, letting people into its private systems without permission. The breach wasn’t found until April 5, 2024,…
May 13, 2024NewsroomSoftware Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library…
Following Australia’s vocal support for Ukraine, the nation finds itself targeted by a Cyber Army Russia Reborn cyberattack. The recent alleged Distributed Denial of Service…
Aerospace giant Boeing has confirmed that the LockBit ransomware gang demanded a staggering $200 million extortion payment after breaching the company’s network and stealing sensitive…
In today’s fast-paced technological landscape, the adoption of Infrastructure as Code (IaC) has revolutionized the way organizations manage and deploy their IT infrastructure. IaC allows…
In this Help Net Security interview, Dana Wang, Chief Architect at OpenSSF, discusses the most significant barriers to improving open-source software security (OSS security) and…