MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?
Jun 30, 2023Ravie LakshmananVulnerability / Software Security MITRE has released its annual list of the Top 25 “most dangerous software...
Read more →Jun 30, 2023Ravie LakshmananVulnerability / Software Security MITRE has released its annual list of the Top 25 “most dangerous software...
Read more →Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework...
Read more →Jun 29, 2023Ravie LakshmananMobile Security / Malware Cybersecurity researchers have shared the inner workings of an Android malware family called...
Read more →Jun 29, 2023Ravie LakshmananMobile Security / Privacy Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an...
Read more →Jun 29, 2023Ravie LakshmananVulnerability / Malware The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called...
Read more →Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure – especially when...
Read more →Jun 29, 2023Ravie LakshmananWebsite Security / Vulnerability A critical security flaw has been disclosed in miniOrange’s Social Login and Register...
Read more →Jun 29, 2023Ravie LakshmananCyber Threat / Hacking A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the...
Read more →Jun 28, 2023Ravie LakshmananFirmware Security / Tech Drones that don’t have any known security weaknesses could be the target of...
Read more →Jun 28, 2023Ravie LakshmananCyber Crime / Cryptocurrency Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that’s...
Read more →Jun 28, 2023Ravie LakshmananRansomware / Cyber Threat A ransomware threat called 8Base that has been operating under the radar for...
Read more →For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself....
Read more →