12 Jun Women In Cybersecurity: A Conversation With Rinki Sethi, CISO Of BILL Posted at 08:49h in Blogs by Di…
Jun 12, 2024NewsroomRansomware / Endpoint Security Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed…
The interim findings of the Competition and Markets Authority’s (CMA’s) investigation into Microsoft’s cloud software licensing strategy should be a…
A dark web hacker that goes by the name “Tombstone” has claimed and advertised multiple vulnerabilities affecting a subdomain affiliated with…
The Black Basta ransomware operation is suspected of exploiting a Windows privilege escalation vulnerability (CVE-2024-26169) as a zero-day before a…
The Cardinal cybercrime group (aka Storm-1811, UNC4393), which operates the Black Basta ransomware, may have been exploiting a recently patched…
Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from…
By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data…
The MEDUSA ransomware group has reared its ugly head again and this time it has claimed to have targeted three…
JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens Pierluigi Paganini June 12, 2024 JetBrains warned to fix a critical…
Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review…











