Microsoft macOS Apps Vulnerability Allows Hackers to Record Audio/Video
Cisco Talos has identified eight security vulnerabilities in Microsoft applications running on the macOS operating system, raising concerns about potential...
Read more →Cisco Talos has identified eight security vulnerabilities in Microsoft applications running on the macOS operating system, raising concerns about potential...
Read more →The US National Institute of Standards and Technology (NIST) has announced three standards for post-quantum cryptography (PQC). But for PQC...
Read more →Suspected hackers behind the heist of $14,000,000 worth of cryptocurrency from blockchain tech firm Holograph was arrested in Italy after...
Read more →A critical vulnerability tracked as CVE-2024-7646, has been uncovered in the widely used ingress-nginx Kubernetes controller. The flaw allows attackers...
Read more →New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds...
Read more →AI SPERA, a leading Cyber Threat Intelligence (CTI) company, has announced a strategic partnership with Hackers Central, a major cybersecurity...
Read more →Exploiting cloud environments is no longer a novel concept; hackers have been refining their tactics and sophistication over the past...
Read more →Skills shortages are preventing firms from working towards artificial intelligence (AI) goals, according to research from Expereo and IDC. Asking...
Read more →The popular flight-tracking website FlightAware discovered a configuration error that exposed the sensitive personal information of its users. The data...
Read more →Stalkerware researcher maia arson crimew strikes again. Big time. We know maia as a researcher that loves to go after...
Read more →Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing...
Read more →Several Microsoft applications designed specifically for the Apple macOS operating system are at risk of being subverted by malicious actors,...
Read more →