Newpark Resources Contends With Ransomware
Newpark Resources, a key supplier to the oilfield industry has disclosed that it fell victim to a ransomware attack that disrupted access to critical systems…
Newpark Resources, a key supplier to the oilfield industry has disclosed that it fell victim to a ransomware attack that disrupted access to critical systems…
The world continues to witness a dramatic transformation in the cybersecurity landscape. The demand for effective, global threat intelligence intensifies as geopolitical and economic shifts…
Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with…
Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates with a command-and-control server operated…
Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted by Forrester Consulting on behalf…
Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security is countering this shift with…
Hackers can exploit critical vulnerabilities in Mazda’s infotainment system, including one that enables code execution via USB, compromising your car’s security and putting you at…
Newpark Resources, a Texas-based company providing essential tools and services to the oil and gas industry, as well as the construction sector, was recently targeted…
The Government of Canada ordered the TikTok Technology Canada Inc. to close its offices in the country following a national security review. This decision was…
Nov 08, 2024Ravie LakshmananIoT Security / Vulnerability The threat actors behind the AndroxGh0st malware are now exploiting a broader set of security flaws impacting various…
Cyber security analysts at ESET have released an in-depth look at the inner workings of the RedLine Stealer operation and its clone, known as Meta,…
A missing authentication flaw in Palo Alto Networks’ Expedition tool now jeopardizes firewall configurations across sectors, with attackers actively exploiting this vulnerability in the wild.…