Patch now! Ivanti Endpoint Manager Mobile Authentication vulnerability used in the wild
A patch is now available for an Ivanti EPMM vulnerability that was used in a cyberattack on the ICT platform which is relied upon by…
A patch is now available for an Ivanti EPMM vulnerability that was used in a cyberattack on the ICT platform which is relied upon by…
We take a look at claims that Yamaha has been compromised by two unrelated ransomware groups. Music giant Yamaha’s Canadian division has experienced a compromise…
A hacktivist was able to grab all the data from a stalkerware operator and shared the method and the findings. Stalkerware-type app Spyhide is coded so…
The Tampa General Hospital has promised to reach out to the individuals whose information has been stolen by the Snatch ransomware group. The Tampa General…
Here are some tips that you can use to set up a secure environment for your parents’ digital needs. If you want to tighten up your parents’…
Apple has released security updates for several products to address several serious vulnerabilities including some actively exploited zero-days. Apple has released security updates for several…
A critical unauthenticated remote code execution vulnerability in Citrix NetScaler ADC and Citrix NetScaler Gateway is being actively exploited The Cybersecurity and Infrastructure Security Agency…
We take a look at reports of cosmetics firm Estée Lauder being attacked by the Cl0p and BlackCat ransomware groups. Estée Lauder is currently at…
In-van delivery driver footage is reportedly finding its way to the internet. Are privacy issues at play, or is a valuable safety tool? Footage from…
We take a look at reports of a document being accidentally shared to the VirusTotal service and potentially exposing names and email addresses in the…
Researchers have uncovered a privilege escalation vulnerability in Google Cloud Build that could enable malicious actors tamper with application images and infect users. Researchers at…
Due to a validation error in Microsoft code, a suspected Chinese attacker was able to access user email from approximately 25 organizations, including government agencies.…