60 New Malicious Packages Uncovered in NuGet Supply Chain Attack
Jul 11, 2024NewsroomSoftware Security / Threat Intelligence Threat actors have been observed publishing a new wave of malicious packages to the NuGet package manager as…
Jul 11, 2024NewsroomSoftware Security / Threat Intelligence Threat actors have been observed publishing a new wave of malicious packages to the NuGet package manager as…
Jul 11, 2024NewsroomVulnerability / Enterprise Security Palo Alto Networks has released security updates to address five security flaws impacting its products, including a critical bug…
The Chief Executive of the National Cyber Security Centre (NCSC), Professor Ciaran Martin, has highlighted concerns regarding the outdated software and hardware in NHS IT…
Image: Midjourney A new threat actor known as CRYSTALRAY has significantly broadened its targeting scope with new tactics and exploits, now counting over 1,500 victims…
Multiple threat actors exploit PHP flaw CVE-2024-4577 to deliver malware Pierluigi Paganini July 11, 2024 Multiple threat actors exploit a recently disclosed security PHP flaw…
Advance Auto Parts is sending data breach notifications to over 2.3 million people whose personal data was stolen in recent Snowflake data theft attacks. Advance…
Fraudsters leverage complex phishing scams in attempt to gain control over organizations’ Meta accounts A sophisticated phishing campaign is targeting businesses of every size in…
Dutch independent research firm TNO is working with the National Cyber Security Centre (NCSC) to investigate future topics and developments that are relevant for the…
SiegedSec, who describe themselves as “gay furry hackers,” claimed responsibility for a cyberattack on The Heritage Foundation before the hacktivist group promptly disbanded. The Heritage Foundation…
Scammers are leveraging deepfake technology to create convincing health and celebrity-endorsed ads on social media, targeting millions globally. Learn how to spot and avoid these…
11 Jul Deep Observability Wanted By CISOs And Corporate Boards Posted at 08:44h in Blogs by Di Freeze This week in cybersecurity from the editors…
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement…