Sep 21, 2023THNSupply Chain / Malware The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back…
In a recent turn of events, PeerBerry, the prominent peer-to-peer lending platform, finds itself at the center of a storm…
The UK is home to around 5.5 million Small and Medium-sized Enterprises (SMEs). They collectively account for 99.9% of businesses,…
Trend Micro has fixed a critical vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been…
As one of the leading eCommerce platforms, Magento hosts many online businesses, each holding vast amounts of sensitive customer and…
The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy….
Snatch ransomware group targeted a government agency for veterans. The hackers posted about a cyber attack on the Florida Department…
The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:- The TAG-74 utilizes…
To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance…
Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of…
50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum….
Sep 21, 2023THNVulnerability / Exploit A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability…