A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…
U.S. CISA adds Cleo Harmony, VLTrader, and LexiCom flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 14, 2024 U.S….
File upload vulnerabilities are fun to find, they are impactful by nature and in some cases even result in remote…
Maintaining a resilient, secure, and efficient network infrastructure is more important than ever. Network monitoring systems, which encompass both hardware…
Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted…
In a significant turn towards a passwordless future, Microsoft has announced groundbreaking strides in adopting passkeys, a secure and user-friendly…
What a week! On Monday, police arrested 26-year-old Luigi Mangione and charged him in the murder of UnitedHealthcare CEO Brian…
The threat landscape continues to evolve, and companies around the world face escalating risks heading into 2025. As AI enables…
External vulnerability scans have become a staple in the cybersecurity toolkit of most organizations. Similar to a penetration test, external…
Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that…
In an era defined by the exponential growth of digital transformation, traditional Virtual Private Network (VPN) solutions have become a…
The Federal Office for Information Security (BSI) in Germany has taken decisive action against a wave of malware-infected digital picture…











