Dec 01, 2023The Hacker NewsNetwork Security / Cyber Attack The most recent Gcore Radar report and its aftermath have highlighted…
Authored by Neelesh Kripalani, Chief Technology Officer, Clover Infotech Once again, we have reached that time of the year, when…
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…
With the latest round of security updates, Apple has fixed two zero-day WebKit vulnerabilities (CVE-2023-42916, CVE-2023-42917) that “may have been…
A former Post Office senior criminal lawyer, who celebrated a court victory that sent a pregnant woman to prison without…
Dec 01, 2023NewsroomCyber Espionage / Cryptocurrency The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday…
Notepad++ has been discovered with an uncontrolled search path vulnerability, which could allow threat actors to search an untrusted search…
In a reminiscent scene of a child complaining to their parents about a friend or schoolmate’s behavior, both Meta and…
Dec 01, 2023NewsroomFirewall / Network Security Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall,…
In an era dominated by digital interactions, the need for robust online security measures is more crucial than ever. Passwords,…
Here’s a look at the most interesting products from the past week, featuring releases from Amazon, Datadog, Entrust, Fortanix, GitHub,…
With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace cloud-based cybersecurity. And rightly…











