Many customer-facing APIs remain unprotected, leaving businesses vulnerable to breaches. To address these threats, a comprehensive approach to API security,…
Relive the 90s web era! The Neuro Nostalgia Hackathon challenged teams to transform modern sites into retro masterpieces with spinning…
U.S. CISA adds Acclaim Systems USAHERDS flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 23, 2024 U.S. Cybersecurity and…
Adobe has released out-of-band security updates to address a critical ColdFusion vulnerability with proof-of-concept (PoC) exploit code. In an advisory released…
KEY SUMMARY POINTS Focus Shift to Nuclear Industry: The Lazarus Group, linked to North Korea, has shifted its targets to…
The Federal Trade Commission (FTC) has ordered Marriott International and Starwood Hotels to define and implement a robust customer data…
Two WordPress plugins required by the premium WordPress WPLMS theme, which has over 28,000 sales, are vulnerable to more than a dozen…
A U.S. federal judge has ruled that Israeli spyware maker NSO Group violated U.S. hacking laws by using WhatsApp zero-days…
A newly discovered vulnerability, dubbed “G-Door,” allows malicious actors to circumvent Microsoft 365 security measures by exploiting unmanaged Google Docs…
Lazarus Group Targets Nuclear Power Organizations with Sophisticated Malware Campaign The Lazarus Group, a well-known hacking collective widely believed to…
U.S. Court rules against NSO Group in WhatsApp spyware Lawsuit Pierluigi Paganini December 23, 2024 A U.S. court ruled in…
Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…











