A threat actor is harvesting identity and access management (IAM) credentials from public GitHub repositories within five minutes of exposure,…
WiHD leak exposes details of all torrent users Pierluigi Paganini October 31, 2023 World-in-HD (WiHD), a French private video torrent…
An actor that security researchers call Prolific Puma has been providing link shortening services to cybercriminals for at least four…
Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined…
Exploitation of a recently patched critical vulnerability in F5’s BIG-IP product started less than five days after public disclosure and…
A new NuGet typosquatting campaign pushes malicious packages that abuse Visual Studio’s MSBuild integration to execute code and install malware…
The Kopeechka service, which refers to “penny” in Russian, is a new tool criminals use to quickly and easily generate…
Slow progress on gender diversity Getting this right remains a key issue because women are still woefully under-represented in the…
The Government of Canada has instructed government employees to immediately uninstall WeChat and Kaspersky apps from their smartphones, tablets, and…
Tech company F5 has warned customers about a critical authentication bypass vulnerability impacting its BIG-IP product line that could result…
Oct 31, 2023NewsroomVulnerability / Data Protection Atlassian has warned of a critical security flaw in Confluence Data Center and Server…
The research and development team at Spotify has nominated four open source projects to receive a share of its annual…