CVE Prioritizer is an open-source tool designed to assist in prioritizing the patching of vulnerabilities. It integrates data from CVSS,…
February 16, 2024 – A group of cybercriminals is committing bank fraud by convincing victims to scan their IDs and…
The Reserve Bank of India has allegedly been targeted in a cyberattack, linked to threat actor ZALCYBER. Although the RBI…
A database containing 21,988 complete credentials, encompassing login details and passwords, allegedly tied to Comisiones Obreras (CC. OO.), has been…
Telstra is trialling a way to keep critical services like eftpos and Services Australia numbers working in the event of…
SolarWinds addressed critical RCEs in Access Rights Manager (ARM) Pierluigi Paganini February 19, 2024 SolarWinds addressed three critical vulnerabilities in…
Oleksandr Kryvtsov had enough. The owner of an agricultural company in Hrakove, near Kharkiv, Kryvtsov found his land littered with…
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept…
Protecting against credential stuffing attacks requires a multi-layered approach to security. Here are some effective strategies to defend against such…
When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known…
Feb 19, 2024NewsroomCyber Espionage / Vulnerability Threat actors operating with interests aligned to Belarus and Russia have been linked to…
ETISALAT, the state-owned Emirates Telecommunications Group Company PJSC in the UAE, is reportedly grappling with a ransomware assault attributed to…











