Cybersecurity firm Mandiant has uncovered a series of sophisticated cyberattacks targeting Ivanti Connect Secure VPN appliances. These attacks, attributed to…
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance…
The European policy agency, Europol, is to offer law enforcement agencies access to a “unique dataset” about the operations of…
HOYA CORPORATION, the world’s second-largest lens manufacturer, has reported an IT system incident that has disrupted its operations. The Tokyo-based…
Hackers have been found hijacking Facebook pages to impersonate popular AI brands, thereby injecting malware into the devices of unsuspecting…
Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional…
Cyberattack disrupted services at Omni Hotels & Resorts Pierluigi Paganini April 05, 2024 US hotel chain Omni Hotels & Resorts…
The Pixel Update Bulletin details security vulnerabilities and functional improvements for supported devices. Updating to the April 2024 security patch…
Hackers commonly employ dynamic-link library (DLL) hijacking and unhooking of APIs to damage security measures and authorize harmful activities on…
Advanced Exposure Investigation and AI-Powered Remediation Capabilities Now Available TEL AVIV – March 28, 2024 – Stream.Security, a leading…
Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws…
A fake e-shop scam campaign has been targeting Southeast Asia since 2021, as CRIL observed a surge in activity in…










