Expensive Investigations Drive Surging Data Breach Costs
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to the significant costs involved. Each…
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to the significant costs involved. Each…
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect downloaders with the VenomRAT malware.…
Signal has announced that it upgraded its end-to-end communication protocol to use quantum-resistant encryption keys to protect users from future attacks. Quantum computers that use…
Scammers are impersonating the bankruptcy claim agent for crypto lender Celsius in phishing attacks that attempt to steal funds from cryptocurrency wallets. In July 2022,…
Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro’s Apex One endpoint protection solution that was actively exploited in attacks. Apex One is…
The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached. “At the end of last…
GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users via scheduled security scan policies.…
Microsoft said today that the Exchange Web Services (EWS) API for Exchange Online and Office 365 will be retired in approximately three years. EWS is a…
New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat actors to remotely execute commands…
Microsoft has released Windows Subsystem for Linux (WSL) 2.0.0 with a set of new opt-in experimental features, including a new network mode and automated memory…
The APT36 hacking group, aka ‘Transparent Tribe,’ has been observed using at least three Android apps that mimic YouTube to infect devices with their signature remote…
An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers can exploit without authentication. In…