Akira ransomware group added U.S.-based software company Parathon to its victim list. The hackers claimed to have 560 GB of…
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…
High-profile ransomware attacks on corporations like Kaseya, Colonial Pipeline, and MOVEit may lead to the misconception that only large organizations…
Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…
The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware…
Microsoft has issued an alert on the OneNote spoofing vulnerability, patched previously. According to the latest update from Microsoft, the…
US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog….
QNAP operating systems are robust, user-friendly software platforms that power NAS and NVR devices. QNAP offers four operating systems, and…
The updated Burp suite scanner has new add-on features and bug fixes that enhance the scanning process’s overall performance. Burp…
Nile, a networking startup co-founded by former Cisco Systems executives John Chambers and Pankaj Patel, has raised US$175 million ($265…
The recently patched zero-day vulnerability affecting Ivanti’s Endpoint Manager Mobile (EPMM) product has been exploited by an advanced persistent threat…
The overarching mission of the US-based non-profit organization the Tor Project is to advance human rights and make open-source, privacy…