Retail ERP systems are typically integrated with other key business systems, including eсommerce platforms, procurement and HR software, CRM, and…
Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and…
The British National Cyber Security Centre (NCSC) says it expects Artificial Intelligence (AI) to heighten the global ransomware threat. In…
Jan 25, 2024NewsroomFileless Malware / Endpoint Security Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s…
Multi-solution crowdsourced cyber security platform Bugcrowd says it saw growing acceptance and adoption of crowdsourced security strategies among mainstream end-user…
Malicious activity targeting a critical severity flaw in the ‘Better Search Replace’ WordPress plugin has been detected, with researchers observing…
GitLab has released important security fixes for versions 16.7.2, 16.6.4, and 16.5.6 for GitLab Community Edition (CE) and Enterprise Edition…
While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch…
Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…
Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking…
Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business…
Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins…











