Category: CyberSecurityNews
SelectBlinds, a well-known online retailer specializing in custom blinds and shades, has confirmed a data breach that exposed the sensitive…
A new sophisticated phishing technique utilizes Microsoft Visio files and SharePoint in a two-step phishing attack. This two-step attack method…
VMware, a leading virtualization software provider, has significantly changed its licensing model for its popular desktop hypervisor products, VMware Fusion…
Dell Technologies has disclosed three critical security vulnerabilities affecting its Enterprise SONiC (Software for Open Networking in the Cloud) operating…
A critical vulnerability in the widely used MOVEit file transfer software has led to one of the most extensive corporate…
Palo Alto Networks has issued a critical security advisory regarding a potential remote code execution (RCE) vulnerability affecting the PAN-OS…
SEO poisoning is a malicious tactic where threat actors manipulate search engine results to promote harmful websites by exploiting trending…
Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments Sweet Security today announced the…
Modern security tools continue to evolve, improving their ability to protect organizations from cyber threats. Despite these advances, bad actors…
Researchers discovered five malicious npm packages that target Roblox developers, spreading malware to steal credentials and personal information. These packages,…
Hackers weaponize Excel documents primarily due to their widespread use and the inherent vulnerabilities within the software. With Microsoft blocking…
Decentralized finance (DeFi) protocol DeltaPrime has fallen victim to yet another major exploit. Hackers siphoned off approximately $4.8 million worth of ARB and AVAX tokens. The…











