Multiple vulnerabilities in the popular airline and hotel rewards platform points.com could have allowed attackers to access users’ personal information,…
A malicious package that mimics the VMware vSphere connector module ‘vConnector’ was uploaded on the Python Package Index (PyPI) under…
Using fake certificates, attackers gain unauthorized access to corporate network resources. Attackers use such certificates to trick the Key Distribution…
The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the…
Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate…
Google is making it easier for users to remove personal contact information and personal, non-consensual explicit imagery from Google search…
In what appears to be a targeted cyber attack, the NDT SEC hacking group has reportedly aimed at Delta Electronics’…
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store….
Over the past couple of years, the cost of living in the UK has increased significantly. The annual rate of…
Exploitation of the recently disclosed Ivanti Endpoint Manager Mobile (EPMM) vulnerability has started to pick up, just as the vendor…
By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate….
The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to…