Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
Jun 26, 2024NewsroomSupply Chain Attack / Web Security Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a…
Jun 26, 2024NewsroomSupply Chain Attack / Web Security Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a…
Australian banks and organisations exploited by SMS scammers, and the telcos asked to filter and block scams, want a mandatory sender ID registry, but the…
The data you’ve worked hard to secure is facing more threats than ever, and for more reasons than you realise, according to new research from…
Progress Software’s popular MOVEit Transfer and MOVEit Cloud-managed, file transfer solutions, have been found to contain a critical authentication bypass vulnerability (CVE-2024-5806). The vulnerability, which…
In this Help Net Security interview, Morgan Wright, Chief Security Advisor at SentinelOne, discusses how AI is utilized in modern cyber warfare by state and…
The National Health Laboratory Service (NHLS), South Africa’s primary diagnostic pathology service for public healthcare facilities, has fallen victim to a cyber attack. The incident,…
Cyble Research and Intelligence Labs (CRIL) researchers have observed the Russia-linked threat actor group UAC-0184 targeting Ukraine with the XWorm remote access trojan (RAT) through…
Domino’s Pizza Enterprises is set to lose its group chief operating officer – whose remit covers group IT, digital, data, e-commerce and other functions –…
By Vira Shynkaruk, Cybersecurity Content Expert, UnderDefense Making the right call on cybersecurity solutions is paramount for businesses, especially now, when they are constantly under…
Luxury retail chain Neiman Marcus has begun to inform customers about a cyberattack it discovered in May. The attacker compromised a database platform storing customers’…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Monday that a cyberattack in January may have compromised sensitive information related to the nation’s…
Threat actors are using a new attack technique that allows them to evade detection and gain full code execution of Microsoft Management Console using specially…