Google Detects 4th Chrome Zero-Day in May Actively Under Attack
May 24, 2024NewsroomVulnerability / Browser Security Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said…
May 24, 2024NewsroomVulnerability / Browser Security Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said…
Australian cyber chief announced Friday an “unwelcome development” in the recently disclosed MediSecure data breach. A hacker claimed to possess the patient data likely siphoned…
CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May 24, 2024 CISA adds Apache Flink improper access control vulnerability to…
The activities of the Chinese threat actor group known as Sharp Dragon (formerly Sharp Panda) have been meticulously documented. Since 2021, this group has been…
May 24, 2024NewsroomSupply Chain Attack / Malware Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS)…
HM Revenue and Customs (HMRC) has significantly increased its spending on data science expertise, according to figures revealed by a Freedom of Information (FoI) request. The…
The introduction and widespread use of generative AI technologies such as ChatGPT has shown a new era for the world but comes with some unexplored…
An unknown ransomware actor has compromised the personally identifiable data of more than 50,000 Californian school administrators, their association told Maine’s Attorney General in a…
Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors Pierluigi Paganini May 24, 2024 The use of Dynamic DNS (DDNS) services…
Google has released a new emergency security update to address the eighth zero-day vulnerability in Chrome browser confirmed to be actively exploited in the wild.…
Phishing attacks have evolved into increasingly sophisticated schemes to trick users into revealing their personal information. One such method that has gained prominence involves phishing emails masquerading as PDF viewer login pages. These deceptive emails lure unsuspecting users into entering their…
One in three organizations are not currently able to proactively identify, assess, and mitigate risk with their GRC program, nor are they able to ensure…