SEC Charges Maryland CEO With Data Center Fraud
A federal grand jury in the District of Columbia has indicted Deepak Jain, a 49-year-old Maryland resident, on charges of major fraud against the United…
A federal grand jury in the District of Columbia has indicted Deepak Jain, a 49-year-old Maryland resident, on charges of major fraud against the United…
VMware fixes high-severity SQL injection flaw CVE-2024-38814 in HCX Pierluigi Paganini October 17, 2024 VMware fixes a high-severity SQL injection flaw in HCX allowing non-admin…
Hackers are increasingly targeting ATMs through various illicit methods. They exploit physical and software vulnerabilities to force machines to dispense cash. The rise of accessible…
In its recently published Annual Digital Defense Report, Microsoft provided a comprehensive overview of its ongoing efforts to safeguard users and businesses against the growing…
MongoDB Queryable Encryption allows customers to securely encrypt sensitive application data and store it in an encrypted format within the MongoDB database. It also enables…
Oct 17, 2024Ravie LakshmananVulnerability / Kubernetes A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be abused…
Veeam has addressed a severe vulnerability in its widely utilized Backup & Replication tool, CVE-2024-40711. This critical flaw has a staggering Common Vulnerability Scoring System…
A federal grand jury indictment unsealed today charges two Sudanese nationals with operating and controlling Anonymous Sudan, an online cybercriminal group responsible for tens of…
A company has fallen victim to a cyberattack after unknowingly hiring a North Korean cybercriminal as a remote IT worker. The unidentified firm, based in…
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have taken a significant step forward in promoting secure software development…
Certificate-Based Authentication (CBA) is a robust security mechanism that has been a cornerstone in high-security environments for decades. It leverages digital certificates to verify the…
The Cybersecurity and Infrastructure Security Agency (CISA) has recently added three vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, emphasizing the pressing need for organizations…