In our dialogues with customers, we often come across cross-site request forgery (CSRF) findings marked as False Positives due to having…
As QR codes continue to be heavily used by legitimate organizations—from Super Bowl advertisements to enforcing parking fees and fines,…
May 08, 2023Ravie LakshmananData Breach / Ransomware Digital storage giant Western Digital confirmed that an “unauthorized third party” gained access…
Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. These groups are tracked…
May 08, 2023Ravie LakshmananCyber Espionage / Threat Intel The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging…
On November 6th, over 60 hackers descended on the City of Angels for the final HackerOne flagship live hacking event…
Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include…
May 08, 2023The Hacker NewsWebinar / Ransomware Are you concerned about ransomware attacks? You’re not alone. In recent years, these…
The Akira ransomware group listed the McGregor company on its victim list. The McGregor cyber attack was conducted early in…
December is here again and the year is coming to a close even though it feels like it was January…
In the ongoing story of the Sun Pharma cyber attack, the alleged hacker group has started leaking stolen data from…
Infamous OilRig Advanced Persistent Threat (APT) group that has been active in the Middle East and Turkiye for over a…