The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by…
Microsoft announced earlier this week that the NTLM authentication protocol will be killed off in Windows 11 in the future. NTLM (short for…
GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,…
Each year, the cybersecurity industry anticipates a handful of landmark research that informs the market regarding benchmarking best practices, understanding…
Microsoft Threat Intelligence has revealed that it has been tracking the active exploitation of a vulnerability in Atlassian Confluence software…
Coordinated Vulnerability Disclosure (CVD) or Vulnerability Disclosure Policies (VDP) for technology are key components of a security strategy that builds…
Cybercriminals are employing a novel code distribution technique dubbed ‘EtherHiding,’ which abuses Binance’s Smart Chain (BSC) contracts to hide malicious…
OWASP ZAP is a free and open-source web application security scanner. It is designed to be utilized by expert penetration…
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831…
Amidst the cries for freedom from the war initiated by Hamas, innocent citizens of Israel are facing a new threat…
The US Securities and Exchange Commission (SEC) has launched a probe into the mass breach of Progress Software’s MOVEit file…
A new supply-chain attack, which was active throughout September 2023, has been discovered in which threat actors used Typosquatting and…