D-Link has fixed two critical-severity vulnerabilities in its D-View 8 network management suite that could allow remote attackers to bypass…
In the financial services landscape, the threat of fraudulent activities is a persistent concern. Financial institutions, in their quest to…
Attackers are now using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts to steal Microsoft credentials in targeted phishing attacks designed…
For many HackerOne customers, Slack is the place where team collaboration happens and where work gets done. Originally, we built…
Password security, like threat actor methods, continues to evolve. As computing power grows, previously best-practice passwords become increasingly vulnerable. Password…
ChatGPT, the AI-based chatbot developed by Microsoft, can answer anything and everything. However, can you imagine that chatbot assistance is…
May 25, 2023Ravie LakshmananNetwork Security / Vulnerability Zyxel has released software updates to address two critical security flaws affecting select…
SAP and Diageo – the drinks company that makes Guinness, Smirnoff and Johnnie Walker – have announced a five-year deal that includes…
Hacktivity is one of the most popular pages on hackerone.com. And for good reason as it’s a veritable treasure trove…
Mandiant security researchers have discovered a new malware called CosmicEnergy designed to disrupt industrial systems and linked to Russian cybersecurity…
May 25, 2023Ravie LakshmananGaming / Server Security A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS)…
May 25, 2023Ravie LakshmananEmail Security / Exploit An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted…