30+ Tesla Cars Hacked Globally Using Third-Party Software
A security researcher identified a vulnerability in TeslaLogger, a third-party software used to collect data from Tesla vehicles, that leveraged...
Read more →A security researcher identified a vulnerability in TeslaLogger, a third-party software used to collect data from Tesla vehicles, that leveraged...
Read more →Threat intelligence feeds provide real-time updates on indicators of compromise (IOCs), such as malicious IPs and URLs. Security researchers and...
Read more →Malware experts all over the world can’t do their jobs without YARA. YARA has been updated many times to add...
Read more →The email campaign impersonates the Facebook Ads Team to trick users into clicking a malicious link, as the email leverages...
Read more →The cybersecurity company Proofpoint has found a new operation using the SugarGh0st Remote Access Trojan (RAT) that is going after...
Read more →Jason Peraire-Bueno, 28, of New York, and Anton Peraire-Bueno, 24, of Boston have been charged with wire fraud, plot to...
Read more →“Encrypted DNS Implementation Guidance,” a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA), tells government agencies how to...
Read more →Microsoft has said that all Azure users will have to use multi-factor authentication (MFA) starting in July. This is a...
Read more →Hackers often target XLSX, HTML, and PDF files as they are widely used, and their trustable file formats also attract...
Read more →LogRhythm and Exabeam, two leading cybersecurity companies, announced today their intent to merge in a transformative deal that will create...
Read more →Apple has released security updates to address a zero-day vulnerability in its Safari web browser that was exploited during this...
Read more →A newly disclosed vulnerability, CVE-2024-22026, has been found in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core. This vulnerability allows...
Read more →